The author, who has managed both in-house and contracted security services, states unequivocally that hospitals can save money by hiring a security company, but cautions that there may be other considerations involved. In this article he provides guidance on making valid and meaningful comparisons between the two options.
{"title":"Should you outsource your hospital's security services? Some things to consider.","authors":"David V DiNapoli","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>The author, who has managed both in-house and contracted security services, states unequivocally that hospitals can save money by hiring a security company, but cautions that there may be other considerations involved. In this article he provides guidance on making valid and meaningful comparisons between the two options.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"46-54"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the additional services that Security provides in the healthcare setting, should be accurate and thorough accident investigations. These can be critical in protecting your facility's interests, the authors point out. In this article, they describe in detail the accident investigation skills which are required of frontline security officers.
{"title":"Accident investigation for the security professional.","authors":"William R Losefsky, Jeffrey M Putnam","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>One of the additional services that Security provides in the healthcare setting, should be accurate and thorough accident investigations. These can be critical in protecting your facility's interests, the authors point out. In this article, they describe in detail the accident investigation skills which are required of frontline security officers.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"61-6"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this article, the author a healthcare IT expert, reveals what experts have discovered in analyzing HIPPA data breaches. Most are the result of theft or loss. She explains why this is so, and offers a solution--improved physical security.
{"title":"Physical security, HIPPA, and the HHS wall of shame.","authors":"April Sage","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>In this article, the author a healthcare IT expert, reveals what experts have discovered in analyzing HIPPA data breaches. Most are the result of theft or loss. She explains why this is so, and offers a solution--improved physical security.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"85-90"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The 2014 IHSSF crime survey.","authors":"Karim H Vellani","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"28-35"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A hospital's Security Management Plan, required by the Joint Commission, can also be used by security management professionals, the author points out, to ensure that they are continually monitoring and improving the program in a changing healthcare environment.
{"title":"Tools for an effective annual review of the Security Management Plan.","authors":"Matthew Daniel","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>A hospital's Security Management Plan, required by the Joint Commission, can also be used by security management professionals, the author points out, to ensure that they are continually monitoring and improving the program in a changing healthcare environment.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"105-8"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Whether management wants it or not, as the security experts, it's our job to measure how we manage risk and inform management on our status, the authors say. In this article, they provide five steps to building a responsive security metrics program.
{"title":"Building a metrics program that matters.","authors":"George Campbell, Marleah Blades","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Whether management wants it or not, as the security experts, it's our job to measure how we manage risk and inform management on our status, the authors say. In this article, they provide five steps to building a responsive security metrics program.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"116-24"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evidence collection and storage policies.","authors":"Julie Schenck","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"88-91"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visiting nurse service and home healthcare visitation safety.","authors":"Dan Beaver","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"107-16"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The author, who has trained thousands of police and civilians in use-of-force, tackles the controversy over the use of CEW technology (TASERS) in healthcare settings. In this article he provides the latest technical developments for such weapons, dispels three common myths about them, and provides fresh perspective for further discussion and consideration of their use in healthcare security.
{"title":"TASERS in healthcare: myths and merits.","authors":"Brian T Bastianelli","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>The author, who has trained thousands of police and civilians in use-of-force, tackles the controversy over the use of CEW technology (TASERS) in healthcare settings. In this article he provides the latest technical developments for such weapons, dispels three common myths about them, and provides fresh perspective for further discussion and consideration of their use in healthcare security.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"30-4"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Between 30 to 45% of breaches in Protected Health Information (PHI) involve vendors, yet in most cases it is the hospital that is held liable for the breach. In this article, the author explores the practice of relying on vendors to conduct their own background checks of employees they assign to hospitals. He provides guidance on how hospitals can insure that such checks are up to the standards of the hospital's own background procedures without taking over that responsibility from vendors.
{"title":"HIPPA compliance for vendors and suppliers.","authors":"John M White","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Between 30 to 45% of breaches in Protected Health Information (PHI) involve vendors, yet in most cases it is the hospital that is held liable for the breach. In this article, the author explores the practice of relying on vendors to conduct their own background checks of employees they assign to hospitals. He provides guidance on how hospitals can insure that such checks are up to the standards of the hospital's own background procedures without taking over that responsibility from vendors.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"91-7"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}