You are previewing Hospital and Healthcare Security, 6th Edition.
O'Reilly logo
Hospital and Healthcare Security, 6th Edition

Book Description

Building on the foundation of the previous five editions, Hospital and Healthcare Security, 6th Edition includes new and updated chapters to reflect the current state of healthcare security, particularly in data security and patient privacy, patient-generated violence, and emergency preparedness and management. The recognized leading text in the healthcare security industry, Hospital and Healthcare Security, 6th Edition explains the basics as well as higher expertise concerns, such as the roles of design, emergency management, and policy. Conveying a wide spectrum of topics in an easy to comprehend format, Hospital and Healthcare Security, 6th Edition provides a fresh perspective for healthcare security professionals to better prepare for security issue before they occur.



  • Offers a quick-start section for hospital administrators who need an overview of security issues and best practices.
  • Includes a sample request for proposals (RFP) for healthcare security services and incident report classifications.
  • General principles clearly laid out so readers can apply internationally recognized industry standards most appropriate to their own environment.
  • The new edition includes materials that address the latest issues of concern to healthcare security professionals, including security design, emergency management, off-campus programs and services, and best practices in mitigating patient-generated violence.

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. About the Authors
  6. Foreword
  7. Acknowledgements
  8. Special Acknowledgement of Russell Colling
  9. Chapter 1. The Healthcare Environment
    1. Categories of Healthcare
    2. Types of Hospitals
    3. Nonhospital Side of Healthcare
    4. Diverse Stakeholders
    5. Staffing the Medical Care Facility
    6. The Healthcare Security Administrator
    7. The Joint Commission
    8. The Environment of Care Committee
    9. The Centers for Medicare and Medicaid Services
    10. Health Insurance Portability and Accountability Act
  10. Chapter 2. Protecting a Healing Environment
    1. Defining Healthcare Security
    2. Basic Rationale of Healthcare Security
    3. Evolution of Healthcare Security
    4. Security, Risk Management, Safety
    5. Developing the Security System
    6. Psychological Deterrents
    7. Basic Security Program Objectives
    8. External Forces
    9. Body of Knowledge
  11. Chapter 3. Healthcare Security Risks and Vulnerabilities
    1. Basic Healthcare Security Risks/Vulnerabilities
    2. Primary Security Risks
    3. Facility Security Risk Assessment
  12. Chapter 4. Security Management Planning
    1. Security Management Plan
    2. Security Strategic Plan
  13. Chapter 5. Managing the Basic Elements of Healthcare Security
    1. Customer Service
    2. Maintaining an Orderly Environment
    3. Preventative Patrol
    4. Incident Reporting and Investigation
    5. Response to Requests for Service
    6. Security Communications
    7. Parking and Traffic Control
    8. Accident Reporting and Investigation
    9. Security Education and Training
    10. Applicant Background Investigation
    11. Reaction to Internal and External Emergencies
    12. Enforcement of Rules and Regulations
    13. Access Control
    14. Liaison with Law Enforcement and Other Government Agencies
    15. Internal and External Audits
    16. Locks and Keys
    17. Other Support Services
    18. Public/Employee/Community Relations
  14. Chapter 6. Security Department Organization and Staffing
    1. Security Function Reporting Level and Support
    2. Systems (Multifacility) Security Management Control
    3. Types of Security Staff
  15. Chapter 7. Leadership and Professional Development
    1. Defining Leadership
    2. Leadership Competencies
    3. The Security Leadership Role
    4. Leadership Development
    5. The Healthcare Security Supervisor
    6. Motivation
    7. Performance Management
  16. Chapter 8. The Healthcare Security Officer
    1. The Security Officer
    2. Selecting Security Personnel
    3. Full-time Versus Part-time Security Officers
    4. Wage Compensation
    5. Retention
    6. Performance Expectations
  17. Chapter 9. The Security Uniform and Defensive Equipment
    1. Uniforms
    2. Use of Firearms
    3. Other Security and Defensive Equipment Considerations
    4. Use of Force
    5. Training
    6. Security Operations Manual
  18. Chapter 10. Training and Development
    1. Training Concepts
    2. New Security Officer Training
    3. IAHSS Progressive Certification Program
    4. IAHSS Basic Security Officer Training
    5. IAHSS Supervisory Training
    6. Specialized or Supplemental Training
    7. Elective Training
    8. Training Resources and Records Requirements
  19. Chapter 11. Deployment and Patrol Activities
    1. Deployment Objectives
    2. Flexing the Security Staffing Plan
    3. Scheduling the Security Staff
    4. Deployment Patterns and Concepts
    5. Post Assignments
    6. Basic Patrol Deployment Plans
    7. Patient Care Units/Areas
    8. Entrances and Exits
    9. Basic Patrol Concepts
    10. Security Officer Response
    11. Patrol Problems
  20. Chapter 12. Program Documentation and Performance Measures
    1. Purpose of Records
    2. Basic Records
    3. Key Performance Indicators
  21. Chapter 13. Patient Care Involvement and Intervention
    1. Patients
    2. Assisting with Patients
    3. Patient Risk Groups
    4. Patient Property
    5. Visitors
  22. Chapter 14. Human Resources and Staff Responsibilities
    1. Healthcare Employee Selection
    2. Staff Identification Badges
    3. Security-Oriented Employment Guidelines
  23. Chapter 15. Employee Involvement and Security Awareness
    1. Employee Security Education and Motivation
    2. Hospital Watch
  24. Chapter 16. Investigative Activity
    1. Security versus Police Investigation
    2. Types of Investigation
    3. Investigator Attributes
    4. Interviewing and Interrogation
    5. Undercover (Covert) Investigations
  25. Chapter 17. Security Design Considerations for Healthcare
    1. Security Master Plan
    2. IAHSS Security Design Guidelines
    3. Security Design Considerations
    4. Crime Prevention Through Environmental Design (CPTED)
    5. Emergency Management Design
  26. Chapter 18. Physical Security Safeguards
    1. Basics of Physical Security
    2. Barriers
    3. Bollards
    4. Lighting
    5. Trees and Shrubs
    6. Locks and Keys
    7. Security Seals
    8. Glazing (Glass)
    9. Fastening Down Equipment
    10. Marking Property
    11. Safes
    12. Signage
  27. Chapter 19. Electronic Security System Integration
    1. The Security Operations Center
    2. Alarms
    3. Access Control
    4. Video Surveillance
    5. Other Security Technology Applications in Healthcare
    6. Testing and Maintaining Security System Components
    7. Security Technology Implementation Tips
  28. Chapter 20. Preventing and Managing Healthcare Aggression and Violence
    1. The Who (Perpetrators/Visitors)
    2. The What and the Why
    3. The When and the Where
    4. The Management of Healthcare Violence
    5. Preventing Violence in the Workplace
    6. Culture of Tolerance
  29. Chapter 21. Areas of Higher Risk
    1. Security Sensitive Areas
    2. Infant Abductions from Healthcare Facilities
    3. The Basics of the Infant Security Plan
    4. Emergency Department Security
    5. The Hospital Pharmacy
  30. Chapter 22. Areas of Special Concern
    1. Protected Health Information
    2. Information Technology
    3. Materials Management
    4. The Research Laboratory (Animal)
    5. Child Development Centers
    6. Business Office/Cashiers
    7. Other Areas Needing Special Security Consideration
    8. Security Areas of Concern Specific to the Organization
  31. Chapter 23. Parking and the External Environment
    1. Types of Parking Areas
    2. Parking Shuttle Service
    3. Valet Service
    4. Types of Parkers
    5. Automated Controls
    6. Traffic Flow and Space Allocation
    7. Pay for Parking
    8. Parking System Violators
  32. Chapter 24. Nonacute Facilities and Off-campus Programs and Services
    1. The Need for Off-campus Facilities and Services
    2. Home Healthcare (Community Provider Services)
    3. Off-campus Patient Treatment Facilities
    4. Long-term/Residential Care Facilities
    5. Nonclinical Off-campus Facilities
  33. Chapter 25. Emergency Preparedness: Planning and Management
    1. Regulations for Healthcare Emergency Preparedness
    2. Emergency Management Planning
    3. Bomb Threat
    4. Active Shooter Prevention and Response
    5. Patient Decontamination
    6. Evacuation
    7. Emergency Preparedness Exercise Design and Conduct
  34. Chapter 26. A Primer for Healthcare Executives
    1. What Basic Objectives Should We Have for the Security Program?
    2. What Leadership Characteristics Should the Healthcare Security Administrator Possess?
    3. Where Should Security Report?
    4. What Customer Service Expectations Should Be Established for Security?
    5. Why Do I Need a Security Master Plan?
    6. How Do We Identify Our Security Risks and Vulnerabilities?
    7. Does the Community Standard have a Role?
    8. The Security Staffing Model: How Large a Staff Is Needed?
    9. Security Training: What Should I Expect?
    10. How Do I Know My Security Staff Are Competent?
    11. How Much Involvement Should Security Have with Patients?
    12. What Type of Uniform Should Security Officers Wear?
    13. What Use of Force Options Should Be Made Available to Our Security Staff?
    14. How Should Security Be Designed into the Healthcare Facility?
    15. How Important is Access Control?
    16. Where are Alarms Needed?
    17. Why Invest in Video Surveillance?
    18. What Other Security Technology Applications Should be Considered?
    19. The Investment in Security Technology Has Been Made, But How Do We Know it Works?
    20. How Concerned Should We Be about Violence in Healthcare?
    21. Are We Doing Enough to Protect Our Infant and Pediatric Patients?
    22. What Should We Do Differently to Manage Forensic/Prisoner Patients?
    23. Are We Doing Enough to Protect the Privacy of Our Data?
    24. How Do We Get Employee Involvement in the Protection Effort?
    25. What Security-related Policy and Procedures Do I Need?
    26. What Performance Metrics Should I Be Using for Benchmarking My Security Program?
  35. Mental Health Physical Security Review Checklist
  36. Sample Healthcare Security Request for Proposal
  37. Glossary
  38. Index