Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Medical Facilities Protect Against Unauthorized Access

Sinai Hospital
October 19, 2011
Sinai Hospital

There are numerous areas to secure in today’s medical facilities. Outside doors, of course, must offer protection against unauthorized access by patients, visitors, employees and outsiders. Similarly, doors to wards, rooms and offices must be safeguarded. But that is only the beginning of the story. There is also a growing need to restrict access to medicine storage cabinets, medicine carts, computers, medical records systems, ambulances and even parking lots.

Failure to monitor these areas can lead to equipment or prescription drug theft, employee assaults, mistakes with patient medications, confidential patient information being compromised or even ambulances being entered without permission.

But it is the sheer number of doors and cabinets within a medical facility that makes this a complex issue. What is required is a means of controlling access at any and all of these points despite thousands of employees that have different job duties, restricted areas, and work hours.  Fortunately, with today’s access control systems, this can best be achieved via the establishment of an integrated system, one that can run off a medical facility’s existing IT network. 

Simplified, Less Expensive

Although video surveillance camera systems have been IP-based for many years – meaning they are connected directly into existing IT networks using standard cabling – the access control industry initially lagged behind in transitioning to this technology. 

In fact, until recently video surveillance and access control systems were installed completely independently and custom software often had to be created to allow communication and integration between systems or even with an IT network.

Fortunately, today’s access control systems are increasingly IP-based.  By piggybacking on the existing network and its cabling, facility managers and security personnel can quickly and easily install door access readers to a common network switch with standard cables.

If the network switch has a built-in Power over Ethernet (PoE) feature – a common feature – it can even supply power to door access readers through the CAT-5 cabling, with no need to tap into building power. Access control management software is then used to manage an unlimited number of readers from a single, web-enabled interface. 

Nurse accessing a medical cabinet

Securing Doors

In 2010, Moundview Memorial Hospital & Clinics in Wisconsin decided to upgrade its physical security infrastructure with a new, IP-based access control system.  Moundview Memorial provides 24-hour emergency care, clinic, inpatient care, outpatient services, diagnostic testing, surgical procedures and senior services.

According to Jim Franckowiak, Moundview Memorial’s Director of Information Technology, the previous attempt at access control involved a series of keys that were shared by individuals that need to enter important operational locations within the hospital.

“We routinely found ourselves having to track down keys and replace not only keys but locks as well if the keys were lost or if an employee left and forgot to turn their keys in,” explains Franckowiak.

His criteria in selecting an upgraded system included ease of installation, complete access control functionality include the ability to remotely lock down a controlled area if necessary, and the ability to manage the system via a web browser using a computer, tablet or Smartphone.  He found these features in the IP-based system offered by ISONAS Security Systems.

“Having web access to the system I can access remotely, or from my iPad, is very convenient since it allows me to provide access to any door in the system no matter where I am at the moment,” says Franckowiak.

The system was initially deployed in a medical supplies storage area and later expanded to additional departments including the pharmacy, the IT server room, the emergency treatment facilities, and the mail room. 

Installation of the hardware was done by in-house maintenance personnel that installed the low voltage CAT-5 cabling, the ISONAS PowerNet reader-controllers and the other door hardware such as locks and sensors.  The IT department configured the management software.

Today, the system provides administrators at Moundview Memorial with accountability that was not previously available since the system automatically logs the identity of each person entering a door or accessing a facility along with the time of entry.

“Superior physical security applied to the security realities of today’s healthcare facilities environment is what we were after,” says Franckowiak.  “And that’s what we got.”

Medication security

Every year in American hospitals approximately 400,000 patients become ill or injured as a result of a medication error.  In as many as 7,000 of these cases the final outcome is death.  With liability costs averaging more than $600,000 per incident, many hospitals are addressing shortcomings in its medication dispensing process.

At Sinai Hospital of Baltimore, MD, an area of concern was its medication storage. Nurses had to make repeated trips to a medication cart located in the hallway to pick up medications.  With twenty or more cart doors and an unreliable, antiquated manual lock system, personnel struggled to maintain security.

Under the direction of Sinai Hospital patient care director Bonnie Hartley Faust, MS, MBA, RN, Sinai Hospital selected and installed 400 NetLock Medication Cabinets from Cygnus Inc. pre-integrated with a security access lock system from ISONAS.  Each cabinet can be accessed with an employee badge, thus eliminating the need to remember a code or carry a key.

Using management software, reports are used to track who entered each cabinet and when. Any cabinet can be individually assigned access privileges for that location.  For example, nurses and pharmacy staff can be allowed access to a defined list of cabinets and floors limited by specific hours. In addition, pharmacy personnel who stock cabinets can be assigned access at pre-defined time periods. 

Securing other areas

Door access readers can now also be installed inside a fleet of ambulances that are either run by, or partnered with a hospital. In doing so, the access system’s management software can be updated to grant access to the EMTs that operate ambulances. Wireless technology can be used to automatically update the ambulances when they are parked in front of the hospital.

Parking lots is another application that may be of interest to a medical facility.  Installing a centralized access control system and long-range readers at parking facilities reduces parking conflicts and makes it easier for the hospital personnel to enter the parking lots.

Not all of these areas, though, would necessarily come under the same person’s direct control, says Crenshaw.  For that reason, the access control system’s management software has the ability to give administrators control over different portions of the system i.e. in-room cabinets might be monitored by a nursing department, the data center by the IT staff, and building entrances and parking access by the security group.

KEYWORDS: access management IP access management medical security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • access card

    How to Protect Your Access Control System Against Cybercrime

    See More
  • green code on black screen

    Unauthorized network access most common cause of third-party attacks

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing