Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Hospitals & Medical Centers

Supporting the Victims of Domestic Violence at Work through Pro-active Security Planning

healthcare responsive default
August 26, 2016

About 27.3% of women in the United States experience domestic violence, which can spill over into the workplace, said Jim Sawyer, Director of Security Services at Seattle Children’s Hospital. But there are many actions that a security director can take to support those victims, Sawyer said, which includes proactive security planning.       

In a webinar, Supporting the Victims of Domestic Violence at Work through Pro-active Security Planning, Sawyer outlined those actions.

According to Sawyer, the one crucial position that security managers need to take regarding domestic violence in the workplace is that there is a huge amount of emphasis on the active shooter, but domestic violence is often linked to active shooter, so both need priority.

Sawyer advocates providing support for a victim at work, such as:

  1. Involve Human Resources
  2. Document the event
  3. Meet with the victim – don’t force it but do what you can
  4. Run a guns record; does the perpetrator own one?  
  5. Obtain the perpetrator’s picture (a recent one)
  6. Trespass the perpetrator and let him know that you are his only contact. This, said Sawyer, gives you the opportunity to control the situation at the workplace.  
  7. Assist the victim with a no contact order – go to court on her behalf
  8. Provide hotel support to the victim
  9. Provide car support to the victim, by changing their parking spot
  10. Provide a taxi voucher to the victim

Sawyer noted two domestic violence myths that security professionals must squash at work:

  1. We can only help them at work. This is false, as there are many opportunities outside of the workplace to provide assistance. For example, he said, if a victim has a no contact order of protection against a perpetrator, security can help the victim to renew the protection order, provide security reports, provide the victim with a police report, run the background on the perpetrator for the victim and call 911 every time it is violated.
  2. Domestic violence victim support is largely a Human Resources area. This is false because it can fall on security for escorts or for transportation, so it’s a dual effort.

He also communicated the five common and costly mistakes organizations make with regards to domestic violence:

  1. They don’t document.
  2. They don’t call the police.
  3. They minimize the potential for violence.
  4. They do not share information with supervisors.
  5. They don’t follow up with a victim.

Sawyer also discussed several warning signs that a staff member may be in crisis, and this information needs to be communicated to the security team: 

  1. Obvious injuries such as bruises, black eyes, broken bones and hearing loss, often attributed to “falls”, “being clumsy” or “accidents”.
  2. Clothing that is inappropriate for the season, such as long sleeves and turtlenecks, as well as wearing sunglasses and heavy makeup.
  3. Uncharacteristic absenteeism or lateness for work.
  4. Change in job performance, including poor concentration, errors, slowness and inconsistent work quality.
  5. Change in appearance and self-esteem.
  6. Need for increased supervision.
  7. Uncharacteristic signs of anxiety and fear.
  8. Requests for special accommodations, such as leaving early.
  9. Isolation – including unusual quietness or keeping away from others.
  10. Minimization and denial of harassment or injuries.   

View the webinar here

KEYWORDS: domestic violence healthcare

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • domestic violence

    Managing Domestic Violence in a Work at Home World

    See More
  • monitor 2 responsive default security

    New Program Gives Domestic Violence Victims Security Systems

    See More
  • Security newswire default

    NYC Domestic Violence Victims Could Get Paid Time Off to Recover from Abuse

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing