Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Physical Dangers Grow; Patient Information Vulnerable

By Bill Zalud
February 1, 2009

Security in healthcare facilities – similar to some other types of businesses – calls for traditional security answers such as policies, procedures and technologies ranging from visitor management and card access to security video. Emerging regulations, specific to privacy, chronic workplace violence incidents and information security threats now impact on the security profile.

Privacy rules aimed at patient information protection have spurred additional access controls, including biometrics, to secure paper and computer-based documents. Uniquely, healthcare security professionals who employ security video also report the need to position cameras in a way to protect patient privacy.


WORKPLACE VIOLENCE A GROWING CONCERN

Concerning violence, “about ten percent or more of U.S. healthcare workers are assaulted each year,” said Tony York, CPP, CHPA, president, International Association for Healthcare Security & Safety (IAHSS). York, senior vice president of security at Hospital Shared Services, Denver, bases his U.S. assaults estimate on a recent meeting with officials from the National Health Services (NHS), the U.K.’s publicly-funded healthcare system. “We don’t have a national incident reporting system here, but the NHS reports 55,000 assaults on U.K. healthcare workers last year and they suspect at least another 55,000 incidents weren’t reported,” said York. “That’s 110,000 assaults in a healthcare system with only 1.3 million employees.”

That assessment is also reported by the Emergency Nurses Association (ENA), which a few years ago conducted a survey of 1,000 ENA members. It found that 86 percent had been the victim of workplace violence in the past three years, with nearly 20 percent reporting that they experience workplace violence frequently. Additionally, more than 40 percent of survey participants indicated their workplace was somewhat safe or not safe at all.

The “drying up” of U.S. behavioral healthcare funding, illustrated by Denver’s recent closings of five primary mental healthcare facilities according to York, is another reason for increased assaults on healthcare workers nationwide. With the decrease of behavioral care services, mental patients are flooding emergency departments and assaults are escalating.


WEAPON PROBLEMS

York also cited another shocking emergency department statistic that must be addressed with security and access control. A four-year study conducted by the Henry Ford Medical Center, Detroit, reported that four percent of persons arriving at the emergency department carry weapons.

As an advocate of separating the walk-in/reception area from triage, treatment areas and patient quiet/safe rooms, York urged healthcare security “to design and retrofit emergency rooms with access control designs that protect hospital employees, but don’t inhibit the swiftness of ingress that care specialists need in emergencies.”

Then there is the threat from information security incidents.

According to a report in the Dayton Daily News, for example, two employees at Good Samaritan Hospital were accused of allegedly stealing the personal information of deceased patients for fraudulent online loan applications and bank accounts. A hospital spokesperson has told the media that beyond following federal laws protecting patient information, additional electronic safeguards are in place to alert if patient information is being accessed improperly.

Law enforcement officials said that the two employees used data of deceased Good Samaritan patients to fill out applications for online loans as well as open Internet bank accounts before moving the funds to an ATM withdrawal.


BETTER OFFICER SERVICES

Healthcare security and safety officers provide invaluable -- yet often invisible -- support services to healthcare centers. Their diligence assures the community of the highest quality and access to healthcare.

At the beginning of this year, bird flu reemerged in several Asian countries and restarted a fear of a pandemic.

Influenza viruses have threatened the health of animal and human populations for centuries. A pandemic occurs when a novel strain of influenza virus emerges that has the ability to infect and be passed between humans. Because humans lack immunity to the new virus, a worldwide epidemic, or pandemic, can ensue. Three human influenza pandemics occurred in the 20th century. In the U.S., each pandemic led to illness in approximately 30 percent of the population and death in between 2 in 100 and 2 in 1,000 of those infected. It is projected that a modern pandemic, absent effective control measures, could result in the deaths of 200,000 to 2 million people in the United States alone. Since healthcare facilities are at the beachhead of such a threat, many security executives depend on the extensive information on federal government strategic and implementation plans for pandemic flu at http://www.pandemicflu.gov.


SIDEBAR: Emerging Violence Incidents

According to a survey of 1,000 emergency nurses:

86%     Victim in the past three years
20%     Experience workplace violence frequently
40%     Their workplace was somewhat safe or not safe at all

Source: Emergency Nurses Association


Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Guardhouse Feature image

    Sentries to Officers: Guardhouses Diversify

    See More
  • Multi-tasking – It’s in the Cards

    See More
  • Poor Sister No More: Access Enters Spotlight, Again

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing