Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Workplace Violence Prevention Revisited

By Bernard J. Scaglione
June 6, 2011

In July 2010 I wrote about workplace violence within the healthcare industry in this column. The main focus was a document that was published by The Joint Commission titled, “Preventing violence in the health care setting.” I also discussed OSHA document 3148, “Guide for Preventing Workplace Violence for Healthcare Workers and Social Service Workers.” Both documents serve as a guide in the implementation of a workplace violence reduction program. In the column I stressed the need to install physical barriers in order to control access within specific areas of the facility. In addition, I emphasized the need to control visitors into the facility through the use of a visitor management system.

When it comes to workplace violence, the healthcare industry is not alone. OHSA has fined many organizations for violent incidents under its general duty clause and has been tracking violence within the workplace since the early 1990s.

According to the Bureau of Labor Statistics, from 2004 through 2008, an average of 564 work-related homicides occurred each year in the U.S. In 2008, 526 workplace homicides were documented, accounting for 10 percent of all fatal work injuries.

OHSA document 3148 identifies key components in the reduction of workplace violence within healthcare facilities and to healthcare workers. The main component of this document is a checklist of questions that help in the identification of processes that can successfully reduce workplace violence. These controls look to restrict access to people and places within the organization through physical barrier installation and policy implementation. According to OHSA, physical access restriction is the key component to the elimination of violence within the workplace.

Beyond healthcare, physical access restriction holds true for any industry wishing to reduce workplace violence. The use of physical barriers is fundamental in this process. This access restriction starts at the perimeter of the property line. When putting together a workplace violence reduction program, it is important to funnel persons into specific entry points and secure the remainder of the perimeter. Security provisions should physically restrict access onto the property. Consideration should be given to the installation of fencing, walls and other physical barriers that will restrict access. 

At building exteriors, security systems should ensure that all exit and entry points are secure and have significant security in place to identify, detect and record any person who uses an access point in an unauthorized manner. Properly locking exit doors and installed alarm contacts and security video are keys in identifying the unauthorized use of fire exits and doors designated as closed to normal traffic. 

So the purpose of this column is not only to highlight the continued escalation of workplace violence, but promote the importance of providing a consistent perimeter access security program that can reduce violence in the workplace. However, the installation of barriers is not enough: Many times after barriers are installed there is little or no monitoring and maintenance of these provisions. Often I personally see and hear horror stories of poorly managed perimeter security equipment and systems, including:

•  Holes made in fencing or fencing compromised by fallen trees.

•  Vegetation allowed to grow over and around fencing.

•  Gates left hanging from their frames and gate locks are installed so that they can be opened by reaching around or through the fence.

•  The planting of high, thick scrubs that mask access points and allow assailants to hide undetected.

•  Lighting timers that are not updated to keep pace with seasonal changes or lighting that does not properly augment installed security video cameras.

The lack of repair and consistently inspecting exit and entry doors, fencing, lighting and exterior barricades undermines the fabric of any security program. The ability for an individual, stranger or ex-employee to identity and exploit these flaws in the security program may be the difference between a violent incident and the apprehension of an ex-employee/robber who should not be allowed in the facility.

When a commitment is made to identify and install systems to reduce the potential for violence, theft and trespass, processes must be put in place, along with the physical barricades and monitoring systems that will ensure the continued performance of these systems. Continued patrols, quick response to broken components and continued surveillance will guarantee the consistent level of security that is necessary to properly protect everyone that uses and resides within a facility.    

KEYWORDS: OHSA workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bernard J. Scaglione, CPP, CHPA, CHSP, is a principal partner at The Security Design Group in New York City. He has 30 years experience in the security field. Ben is Chairman of the ASIS International Healthcare Council and president of the New York City Metropolitan Healthcare Safety and Security Directors Association. He is a member of the training council for the International Association for Healthcare Security and Safety and is an accomplished author writing for ASIS, the International Association for Healthcare Security and Safety and Lawyers and Judges Publishing. He currently teaches re-certification classes for licensed architects and professional engineers at the Platt Institute in New York City.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Using Access and ID Control to Prevent Workplace Violence

    See More
  • Losing $2 Billion

    See More
  • Determining and Implementing Successful Access Control Solutions

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing