Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Podcasts
    • Photo Galleries
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementSecurity & Business Resilience

5 Tips for Health Risk Management Systems

By Nancy Islas
meeting2-900px.jpg
June 22, 2020

Times have changed and the way we do business will never be the same. The recent pandemic has highlighted health-related risks to organizations of all kinds. In any facility, contagious diseases can cause business interruptions, a loss of confidence and trust, or even life-threatening illness.

While these risks are not entirely new, previous business systems did not provide a way to manage and respond to health-related risks. There is currently a high awareness and urgency around implementing solutions to improve the response to these risks. One such solution is Health Risk Management, or HRM – a set of proactive routine actions that support health policies in order to reduce health risks among an organization’s staff, visitors and customers. It is clear now that even after the "re-opening" phase of the current pandemic, health risk management systems will be an essential, and likely a permanent, part of our future. If an organization does not have this type of solution in place, they are not complying with today’s health standards and could hold liability.

Here are five tips for choosing and implementing a new HRM system that will support the reopening guidelines in America, as well as ongoing needs:

  1. Make sure any new system will support your objectives. The very first step is to be clear on what are the CDC guidelines for employers. Guidelines during all phases of reopening include not only temperature checks, but also testing, isolating and contact tracing. Make sure that any HRM system you are considering includes the capability to support dealing with privileged information, follow up tasks including contact tracing and all the applicable policies in your HR system.
  2. Choose a new HRM system that is both modular and can make use of your existing capital investments in hardware and software. One potential extension of the HRM system to the organization’s infrastructure systems is with electronic security. Controlling access to the organization’s facilities based off a person’s health risk status is one example of an extension. This approach helps achieve safety and security goals and while reducing the overall cost and implementation risk to your organization.
  3. Avoid superficial integration in favor of deep integration. Some providers seem to believe that merely displaying the outputs of several systems on a common screen represents integration. Comprehensive integration uses collected data to reveal the beginning of health-related events that warrant attention and further investigation. The ability to quickly identify abnormalities and/or evolving incidents lets management take early action, before issues become large and costly.
  4. Carefully consider the impact on, and perceptions of, your users. Understanding the company culture, and tailoring your plan to that culture, will make the difference between improving the morale, pride and spirit of your team, or damaging it. Make sure your people feel comfortable returning to work.
  5. Select a good vendor. The best providers not only will work with you to deliver an excellent installation, but also to help ensure your choices will maintain the flexibility and scalability you will need to meet future needs. This value is difficult to overstate.

Organizations will need to manage health risks as they open up again and get back to work. The advantage of a HRM solution is that it extends its reach from just informing to providing specific information that can enable users to implement an effective Health Risk Management process while protecting the privacy and security of both the organization and its people.

KEYWORDS: Centers for Disease Control and Prevention (CDC) pandemic risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maxxess nancy islas headshot
Nancy Islas is President of Maxxess Systems

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • risk-enews

    5 Tips for Minimizing Third-Party Risk

    See More
  • phishing-freepik1170x658v4.jpg

    5 tips for building a positive anti-phishing behavior management program

    See More
  • matches

    Practical tips for effective risk management in crisis situations

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing