Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Workplace Violence Prevention Revisited

By Bernard J. Scaglione
Bernard J. Scaglione
June 6, 2011

In July 2010 I wrote about workplace violence within the healthcare industry in this column. The main focus was a document that was published by The Joint Commission titled, “Preventing violence in the health care setting.” I also discussed OSHA document 3148, “Guide for Preventing Workplace Violence for Healthcare Workers and Social Service Workers.” Both documents serve as a guide in the implementation of a workplace violence reduction program. In the column I stressed the need to install physical barriers in order to control access within specific areas of the facility. In addition, I emphasized the need to control visitors into the facility through the use of a visitor management system.

When it comes to workplace violence, the healthcare industry is not alone. OHSA has fined many organizations for violent incidents under its general duty clause and has been tracking violence within the workplace since the early 1990s.

According to the Bureau of Labor Statistics, from 2004 through 2008, an average of 564 work-related homicides occurred each year in the U.S. In 2008, 526 workplace homicides were documented, accounting for 10 percent of all fatal work injuries.

OHSA document 3148 identifies key components in the reduction of workplace violence within healthcare facilities and to healthcare workers. The main component of this document is a checklist of questions that help in the identification of processes that can successfully reduce workplace violence. These controls look to restrict access to people and places within the organization through physical barrier installation and policy implementation. According to OHSA, physical access restriction is the key component to the elimination of violence within the workplace.

Beyond healthcare, physical access restriction holds true for any industry wishing to reduce workplace violence. The use of physical barriers is fundamental in this process. This access restriction starts at the perimeter of the property line. When putting together a workplace violence reduction program, it is important to funnel persons into specific entry points and secure the remainder of the perimeter. Security provisions should physically restrict access onto the property. Consideration should be given to the installation of fencing, walls and other physical barriers that will restrict access. 

At building exteriors, security systems should ensure that all exit and entry points are secure and have significant security in place to identify, detect and record any person who uses an access point in an unauthorized manner. Properly locking exit doors and installed alarm contacts and security video are keys in identifying the unauthorized use of fire exits and doors designated as closed to normal traffic. 

So the purpose of this column is not only to highlight the continued escalation of workplace violence, but promote the importance of providing a consistent perimeter access security program that can reduce violence in the workplace. However, the installation of barriers is not enough: Many times after barriers are installed there is little or no monitoring and maintenance of these provisions. Often I personally see and hear horror stories of poorly managed perimeter security equipment and systems, including:

•  Holes made in fencing or fencing compromised by fallen trees.

•  Vegetation allowed to grow over and around fencing.

•  Gates left hanging from their frames and gate locks are installed so that they can be opened by reaching around or through the fence.

•  The planting of high, thick scrubs that mask access points and allow assailants to hide undetected.

•  Lighting timers that are not updated to keep pace with seasonal changes or lighting that does not properly augment installed security video cameras.

The lack of repair and consistently inspecting exit and entry doors, fencing, lighting and exterior barricades undermines the fabric of any security program. The ability for an individual, stranger or ex-employee to identity and exploit these flaws in the security program may be the difference between a violent incident and the apprehension of an ex-employee/robber who should not be allowed in the facility.

When a commitment is made to identify and install systems to reduce the potential for violence, theft and trespass, processes must be put in place, along with the physical barricades and monitoring systems that will ensure the continued performance of these systems. Continued patrols, quick response to broken components and continued surveillance will guarantee the consistent level of security that is necessary to properly protect everyone that uses and resides within a facility.    

KEYWORDS: OHSA workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bernard J. Scaglione, CPP, CHPA, CHSP, is a principal partner at The Security Design Group in New York City. He has 30 years experience in the security field. Ben is Chairman of the ASIS International Healthcare Council and president of the New York City Metropolitan Healthcare Safety and Security Directors Association. He is a member of the training council for the International Association for Healthcare Security and Safety and is an accomplished author writing for ASIS, the International Association for Healthcare Security and Safety and Lawyers and Judges Publishing. He currently teaches re-certification classes for licensed architects and professional engineers at the Platt Institute in New York City.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Using Access and ID Control to Prevent Workplace Violence

    See More
  • Ben Scaglione

    Losing $2 Billion

    See More
  • Determining and Implementing Successful Access Control Solutions

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products

Events

View AllSubmit An Event
  • May 23, 2024

    Strategies for Effective Workplace Violence Prevention

    ON DEMAND: In this webinar, Kristen Devitt, a social worker, educator, and former law enforcement officer with 25 years of experience in Behavioral Threat Assessment and Management, will share insights on the critical intersection of workplace violence prevention and intimate partner violence.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing