Sia Presentation100808


Published on

Safe and Secure Hospitals - Solution team\'s approach

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Sia Presentation100808

    1. 1. Excellence in Medical Center Safety and Security Solutions Team Approach Security Industry Association “ Managing Risk, Maximizing Benefits” Paul Baratta National Security Specialist Security Solutions                                      
    2. 2. GE Security & IAHSS Healthcare Benchmarking Study <ul><li>A total of 7,461 online survey invitations were sent by email and by fax to security and safety personnel in hospitals. The sample was provided by International Association for Healthcare Security & Safety (IAHSS) and additional sample purchased from SKA Marketing Research Division of Mediafax, Inc. </li></ul><ul><li>A total of 381 completed the survey in it’s entirety (a 5% response rate) and another 275 partially completed the survey for a total of 656 (a 10% response rate). The final sample skews to larger hospitals versus the national population, but was not weighted due to the inclusion of partial data. </li></ul><ul><li>The questionnaire covered several topics including: </li></ul><ul><ul><li>Technology </li></ul></ul><ul><ul><li>Staffing </li></ul></ul><ul><ul><li>Policies, procedures and attitudes </li></ul></ul><ul><ul><li>Budget </li></ul></ul><ul><ul><li>Incidents </li></ul></ul><ul><ul><li>Hospital demographics </li></ul></ul>
    3. 3. GE Security & IAHSS Healthcare Benchmarking Study Key Findings <ul><li>Technology is Greatest Security Need </li></ul><ul><li>Little Budget Allocated to Technology, Often Request Additional Funds </li></ul><ul><ul><li>Strong interest in assistance and training for: </li></ul></ul><ul><ul><ul><li>ROI story </li></ul></ul></ul><ul><ul><ul><li>Score-Card </li></ul></ul></ul><ul><ul><ul><li>Long-Term Equipment Planning </li></ul></ul></ul><ul><li>Focus Equipment Sales on Upgrades and Add-On </li></ul><ul><ul><li>Plans to upgrade or add-on prevalent </li></ul></ul><ul><ul><li>Many systems older than 5 years </li></ul></ul><ul><li>Focus on Access Control and Key Management </li></ul><ul><ul><li>Many do not have ability to lock-down electronically </li></ul></ul><ul><ul><li>Spending great deal on locksmith service </li></ul></ul><ul><ul><li>Key management can reduce incidents </li></ul></ul><ul><li>Focus on Emergency Department Response </li></ul><ul><ul><li>Most officer time spent on responding to ER </li></ul></ul><ul><ul><li>Patient restraints number one incident </li></ul></ul>
    4. 4. Greatest Security Needs What are your hospital’s greatest security needs? 7% CCTV System/Enhancements/Upgrades 5% Communications/Communication Equipment/Radios/Call Boxes 5% Weapons/Tasers 3% Alarms/Alarm Systems 12% Administration/Hospital Staff More Proactive 52% More/Additional/Qualified Staff 57% Any Staffing Mention 60% Any Equipment Mention 2% 9% 10% 11% 12% 22% Total Technology Upgrades/New More Cameras/New/Upgrades Access Control DVR Upgrades/More/Better DVR’s Surveillance/Video/Equipment/More Coverage Equipment /Additions/New/Upgrades
    5. 5. Lessons Learned… <ul><li>Security requires executive-level priority because… </li></ul><ul><ul><li>Security is usually not a strategic process – mostly reactive </li></ul></ul><ul><ul><li>The lack of processes leads to security to be deployed incorrectly; which leads to heightened risks and ineffective security investment </li></ul></ul><ul><ul><li>Technology is changing at a rapid pace. Expert guidance today helps you avoid costs and error tomorrow </li></ul></ul><ul><ul><li>Many hospitals often lack a long range plan to integrate current and future security technologies </li></ul></ul>
    6. 6. Lessons Learned… <ul><li>Security requires executive-level priority because… </li></ul><ul><ul><ul><li>Security must be balanced with medical center’s needs </li></ul></ul></ul><ul><ul><ul><li>Security is usually ill-funded </li></ul></ul></ul><ul><ul><ul><li>Many times the Security Director does not own the entire security program </li></ul></ul></ul>
    7. 7. The Essence of a Security Program <ul><li>People </li></ul><ul><ul><ul><li>Patients </li></ul></ul></ul><ul><ul><ul><li>Staff </li></ul></ul></ul><ul><ul><ul><li>Visitors </li></ul></ul></ul><ul><li>Process </li></ul><ul><ul><ul><li>Policies and Procedure </li></ul></ul></ul><ul><ul><ul><li>Plans </li></ul></ul></ul><ul><ul><ul><li>Training </li></ul></ul></ul><ul><li>Technology </li></ul><ul><ul><ul><li>Access </li></ul></ul></ul><ul><ul><ul><li>Intrusion </li></ul></ul></ul><ul><ul><ul><li>Video </li></ul></ul></ul>
    8. 8. Security Program Fundamental Goals <ul><li>Environment </li></ul><ul><ul><li>CPTED, design and construction standards </li></ul></ul><ul><li>Access </li></ul><ul><ul><li>Barriers, locks, signage </li></ul></ul><ul><li>Detection </li></ul><ul><ul><li>Surveillance, patrol, alarms </li></ul></ul><ul><li>Response </li></ul><ul><ul><li>Intercom, security/police, employee, recording </li></ul></ul><ul><li>Security Culture </li></ul>Detection Access Environment Response Security Culture
    9. 9. Preplanning Phase Evaluation Plan Development Execution TG0 TG1 TG2 TG3 <ul><li>Hospital Needs Assessment </li></ul><ul><li>Scope out engagement </li></ul><ul><li>GES Project Advisor assigned </li></ul><ul><li>Steering Committee appointed </li></ul><ul><li>Staff Interviews </li></ul><ul><li>Security Management Plan eval </li></ul><ul><li>Security program evaluation </li></ul><ul><li>Data collection methodology </li></ul><ul><li>Risk assessment </li></ul><ul><li>Security surveys </li></ul><ul><li>Vulnerability assessment </li></ul>Hospital Security Roadmap to Excellence <ul><li>Security philosophy development </li></ul><ul><li>Min. physical security standards </li></ul><ul><li>Technology roadmap </li></ul><ul><li>Security staffing analysis and plan </li></ul><ul><li>Policy and procedure analysis </li></ul><ul><li>Equipment specification </li></ul><ul><li>Security environment design guide </li></ul><ul><li>Prioritized implementation plan </li></ul><ul><li>Project cost estimations </li></ul><ul><li>Return on Investment modeling </li></ul><ul><li>Technology training </li></ul><ul><li>Facility installations </li></ul><ul><li>Security survey training </li></ul>Project Summary Security Master Plan Phase I Security Master Plan Phase II Security Master Plan Phase III Deliverables Phases & Tollgates Task Summary Note: Tollgate Reviews are Steering Committee reviews which will require formal sign off
    10. 10. Risk Assessment <ul><li>Identify specific occurrences with adverse consequences (not limited to injury/death) </li></ul><ul><li>Review crime & calls for service data, history of events, staff perception, litigation, industry trends, etc. </li></ul><ul><li>Rate each risk by probability & criticality </li></ul><ul><li>Determine overall risk rating & prioritize </li></ul>
    11. 11. Risk Analysis Method <ul><li>Determine Probability </li></ul><ul><ul><li>The likelihood of a negative event occurring </li></ul></ul><ul><li>Determine Criticality </li></ul><ul><ul><li>The maximum damage that could be inflicted, should the event actually occur </li></ul></ul><ul><li>Evaluate Risk Tolerance </li></ul><ul><ul><li>Decide if the level of risk based on the above factors is tolerable. If not, pursue risk reduction techniques </li></ul></ul>Risks become actual events because: (1) the vulnerability is not recognized, (2) the countermeasures are not effective, (3) the vulnerability has changed.
    12. 12. Joint Commission Risk Assessment Methodology <ul><li>Identify the issue(s) </li></ul><ul><li>Develop arguments in support of the issue </li></ul><ul><li>Develop arguments against the issue </li></ul><ul><li>Objectively evaluate both arguments </li></ul><ul><li>Reach a conclusion </li></ul><ul><li>Document the process </li></ul><ul><li>Monitor and reassess the conclusion to </li></ul><ul><li>ensure it is the best decision </li></ul>
    13. 13. Risk Assessment Process <ul><li>1. Describe (i.e., diagram) intended and actual performance </li></ul><ul><li>2. Identify potential ways the process could break down </li></ul><ul><li>3. Identify the potential risk to patients, including severity; and the potential cause of breakdowns or failure modes of the process </li></ul><ul><li>4. Prioritize potential risks of the breakdown or failure </li></ul><ul><li>5. Redesign the process </li></ul><ul><li>6. Implement and test the redesigned process </li></ul><ul><li>7. Monitor the effectiveness of the redesigned process </li></ul>
    14. 14. Vulnerability Assessment <ul><li>Must follow the risk assessment and security surveys </li></ul><ul><li>Evaluate impact of current mitigation </li></ul><ul><li>Provides the data to make risk mitigation decisions based upon prioritized risk and security profile </li></ul><ul><li>Enables assembly of a Prioritized Action Plan </li></ul>
    15. 15. <ul><li>The Vulnerability Assessment uncovers deficiencies, vulnerabilities and provides recommendations </li></ul><ul><li>Information that you can use to develop a comprehensive Security Master Plan </li></ul><ul><li>The Plan is to mitigate risks providing you with a solid foundation for managing your Healthcare Security Program </li></ul>Security Vulnerability Assessment
    16. 16. Zoned Security Approach Methodology <ul><ul><ul><li>Analyze according to access authorization (patients, staff, medical faculty, volunteers, vendors, contractors, deliveries) </li></ul></ul></ul><ul><ul><ul><li>Enforceable perimeter and barriers </li></ul></ul></ul><ul><ul><ul><li>Limit public access points/authorized egress points </li></ul></ul></ul><ul><ul><ul><li>Channel and vet people </li></ul></ul></ul><ul><ul><ul><li>Incremental increase in security layers to most critical assets </li></ul></ul></ul><ul><ul><ul><li>Reduce barriers to casual and tech surveillance </li></ul></ul></ul>
    17. 17. Zoned security approach in hospitals <ul><li>Zone #1: Public Areas </li></ul><ul><li>Zone #2: Patient Areas </li></ul><ul><li>Zone #3: Staff Areas </li></ul><ul><li>Zone #4: Restricted Areas </li></ul>
    18. 18. GE Security <ul><li>Special Acknowledgements </li></ul><ul><li>Kristi Reese, GE Security Lean Six Sigma Black Belt </li></ul><ul><li>Bob Weronik, GE Corporate Security Officer </li></ul><ul><li>Mike Hugyo, Security Specialist </li></ul><ul><li>Ray Lauk, Vertical Marketing Manager </li></ul>