Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalFire & Life SafetyPhysical Security

Utilizing technology to fuel a workplace violence prevention program

By Paul Sarnese
Hospital staff walking down hallway

Image via Unsplash

March 15, 2024

Workplace violence in healthcare is an international issue. The numbers are staggering:

  1. Two nurses are assaulted every hour in the United States (Press Ganey).
  2. 61% of staff have reported physical abuse (Emergency Nurses Association).
  3. One out of four nurses have been assaulted on the job (American Nurses Association).
  4. 85% of the assaults against staff are committed by the patient receiving care (International Association for Healthcare Security and Safety). 

Violence against caregivers is not a matter of if it will happen, but when. It’s become so common that it’s forcing nurses to leave the industry. Healthcare organizations are feeling the repercussions in their ability to recruit and retain talent, as well as improve patient satisfaction and the bottom line. 

How security teams and executive leaders prioritize safety can make a difference. Understanding the elements of a successful workplace violence prevention program as well as some of the innovative technologies that can be used to mitigate the risk of violence is a first stepping-stone. 

Consider bringing in an outside consultant to conduct a proactive, objective and comprehensive assessment of an existing program. This sends a message to staff that their leaders want to understand the issues impacting safety. An experienced consultant will ask: 

  • Can you demonstrate management’s commitment to support your violence prevention program?
  • Do you have an easy-to-use incident reporting process?  
  • Are staff informing leadership about incidents and their safety concerns? 
  • Do you have a workplace violence committee? Are the right people and disciplines part of the committee? 
  • Do you know your data? Where are the incidents occurring? Who is at most risk of violence? 
  • Are you providing training and education on how to identify and manage aggressive behavior? Does your staff support the training program? 
  • Do you provide resources to support staff who experience a workplace violence incident? 
  • Have you conducted a comprehensive review of your overall workplace violence prevention program? 
  • Have you implemented any evidence-based technology or improved the physical environment to mitigate incidents of violence? 

A healthcare facility with a mature and professionally managed workplace violence prevention program should be able to answer “yes” to all these questions. The reality is that most organizations are just beginning to focus on supporting the infrastructure and putting the systems in place to create a comprehensive workplace violence prevention program. 

However, there is not just one mitigation strategy that will reduce violence in healthcare. The best strategy for leaders is to identify their risk points and evaluate the solution(s) that would mitigate their biggest risk. Fortunately, there are numerous technologies that can improve staff safety and have been proven to reduce incidents of violence. 

Weapons screening 

In 2023, there were 658 mass shootings and over 42,000 Americans were killed by gun violence. As these events rise, weapon screening solutions such as handheld metal detectors, walk through metal detectors, video-based weapon screening and advanced screening using AI, have become a central focus for many healthcare organizations. However, I often caution leaders from deploying a weapon screening solution if their facility has major access control issues. You must first be able to control entry points to successfully deploy a weapon screening solution. Healthcare executives should consider their needs, culture and climate of the surrounding community as well as the financial impact of purchasing and appropriately staffing a weapon screening station. 

Risk assessment 

Risk management is the practice of identifying risk to determine if you can take an action to transfer, reduce, eliminate or accept the risk. Traditionally, risk assessments have been completed manually using an Excel spreadsheet or security vulnerability analysis spreadsheet. Today, there are enterprise risk assessment tools designed to collect and analyze data using analytics and statistical models to create a more accurate depiction of risks. These risk assessment tools can be used to identify access control and network vulnerabilities that could threaten both patient and organizational information. 

Duress buttons 

An International Association for Healthcare Safety and Security Foundation study identified that 89.3% of healthcare worker participants have access to panic buttons, however these are often hardwired to nurse’s stations. And a study by the Emergency Nurses Association identified that 82% of physical violence incidents occur inside a patient’s room, where an outside panic button would not be reachable. Even panic buttons inside the room may be out of reach in a sudden situation. 

To provide a greater sense of safety for staff, many organizations are deploying wearable duress buttons, powered by real-time locating system (RTLS) technology. When staff push the duress button on their personal badge, an alert is sent to nearby colleagues and security teams. The duress buttons and real-time notifications help reduce response times, frequency of restraints and frequency of assaults against staff. 

When evaluating solutions, healthcare organizations should consider maximizing any existing RTLS infrastructure used for asset tracking or nurse call systems. Nurse call systems specifically are a great starting point because many are automated by RTLS—the badge that staff already wear for automated nurse call can easily be turned into a duress button—minimizing workflow disruption. 

Analytics 

Security leaders know that data drives every decision people make, including where to spend time and money. To garner the most value, the data must be searchable, and the system should be able to generate detailed dashboards and reports that allow for the development of actionable tasks. For example, security leaders should be able to search by campus, department, victim type, employee occupation, aggressor type, injury type and if the victim filed a police report. Spell checking and interfacing with the active directory database as well as the admission, discharge and transfer database should be considerations too. 

Healthcare security leaders have an important role to play in preventing violence against caregivers. Security leaders all must actively support the workplace violence prevention program and be able to influence senior leaders when it comes to evaluating new technologies that mitigate the potential of violence. 

KEYWORDS: healthcare healthcare industry healthcare safety Healthcare Violence workplace violence prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

 Paul Sarnese, CHPA, MSE, MAS, CAPM and Safety and Security Consultant.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0121-Active-Feat-slide1_900px

    Recognize. Respond. Survive. A new approach to workplace violence prevention

    See More
  • Workplace Violence Prevention Plan

    Workplace violence prevention: How to formulate a plan

    See More
  • Nurse puts on gloves

    Investigating violence prevention and healthcare workplace violence programs

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing