Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Workplace Violence Prevention Revisited

By Bernard J. Scaglione
June 6, 2011

In July 2010 I wrote about workplace violence within the healthcare industry in this column. The main focus was a document that was published by The Joint Commission titled, “Preventing violence in the health care setting.” I also discussed OSHA document 3148, “Guide for Preventing Workplace Violence for Healthcare Workers and Social Service Workers.” Both documents serve as a guide in the implementation of a workplace violence reduction program. In the column I stressed the need to install physical barriers in order to control access within specific areas of the facility. In addition, I emphasized the need to control visitors into the facility through the use of a visitor management system.

When it comes to workplace violence, the healthcare industry is not alone. OHSA has fined many organizations for violent incidents under its general duty clause and has been tracking violence within the workplace since the early 1990s.

According to the Bureau of Labor Statistics, from 2004 through 2008, an average of 564 work-related homicides occurred each year in the U.S. In 2008, 526 workplace homicides were documented, accounting for 10 percent of all fatal work injuries.

OHSA document 3148 identifies key components in the reduction of workplace violence within healthcare facilities and to healthcare workers. The main component of this document is a checklist of questions that help in the identification of processes that can successfully reduce workplace violence. These controls look to restrict access to people and places within the organization through physical barrier installation and policy implementation. According to OHSA, physical access restriction is the key component to the elimination of violence within the workplace.

Beyond healthcare, physical access restriction holds true for any industry wishing to reduce workplace violence. The use of physical barriers is fundamental in this process. This access restriction starts at the perimeter of the property line. When putting together a workplace violence reduction program, it is important to funnel persons into specific entry points and secure the remainder of the perimeter. Security provisions should physically restrict access onto the property. Consideration should be given to the installation of fencing, walls and other physical barriers that will restrict access. 

At building exteriors, security systems should ensure that all exit and entry points are secure and have significant security in place to identify, detect and record any person who uses an access point in an unauthorized manner. Properly locking exit doors and installed alarm contacts and security video are keys in identifying the unauthorized use of fire exits and doors designated as closed to normal traffic. 

So the purpose of this column is not only to highlight the continued escalation of workplace violence, but promote the importance of providing a consistent perimeter access security program that can reduce violence in the workplace. However, the installation of barriers is not enough: Many times after barriers are installed there is little or no monitoring and maintenance of these provisions. Often I personally see and hear horror stories of poorly managed perimeter security equipment and systems, including:

•  Holes made in fencing or fencing compromised by fallen trees.

•  Vegetation allowed to grow over and around fencing.

•  Gates left hanging from their frames and gate locks are installed so that they can be opened by reaching around or through the fence.

•  The planting of high, thick scrubs that mask access points and allow assailants to hide undetected.

•  Lighting timers that are not updated to keep pace with seasonal changes or lighting that does not properly augment installed security video cameras.

The lack of repair and consistently inspecting exit and entry doors, fencing, lighting and exterior barricades undermines the fabric of any security program. The ability for an individual, stranger or ex-employee to identity and exploit these flaws in the security program may be the difference between a violent incident and the apprehension of an ex-employee/robber who should not be allowed in the facility.

When a commitment is made to identify and install systems to reduce the potential for violence, theft and trespass, processes must be put in place, along with the physical barricades and monitoring systems that will ensure the continued performance of these systems. Continued patrols, quick response to broken components and continued surveillance will guarantee the consistent level of security that is necessary to properly protect everyone that uses and resides within a facility.    

KEYWORDS: OHSA workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bernard J. Scaglione, CPP, CHPA, CHSP, is a principal partner at The Security Design Group in New York City. He has 30 years experience in the security field. Ben is Chairman of the ASIS International Healthcare Council and president of the New York City Metropolitan Healthcare Safety and Security Directors Association. He is a member of the training council for the International Association for Healthcare Security and Safety and is an accomplished author writing for ASIS, the International Association for Healthcare Security and Safety and Lawyers and Judges Publishing. He currently teaches re-certification classes for licensed architects and professional engineers at the Platt Institute in New York City.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Using Access and ID Control to Prevent Workplace Violence

    See More
  • Losing $2 Billion

    See More
  • Determining and Implementing Successful Access Control Solutions

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products

Events

View AllSubmit An Event
  • February 26, 2026

    Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

    ON DEMAND: Workplace violence remains one of the most complex challenges facing healthcare organizations today. Explore the real drivers of violence in healthcare and how proactive communication, de-escalation, access control, and documentation can reduce risk.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing