Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical Security

The future of ID management in healthcare

By Brooke Grigsby
Smart Card Uses Continue to Expand Across Sectors

The same secure chip technology that’s been rolled out in the banking world for ATM and credit card transactions is sweeping across sectors throughout the American economy, ranging from healthcare to higher education, from critical infrastructure to the corporate world.

June 23, 2020

Hospitals are where people go to seek treatment, recover, and address critical injuries. It is the place where doctors, nurses, and other healthcare providers devote themselves to helping people who need medical attention. In addition to this critical focus, a hospital also has to protect against unauthorized access, theft of medications or sensitive patient information and guard against workplace violence, which affects hospitals more than other industries. At the same time, they must maintain a level of accessibility and openness, which presents difficulties as it relates to security.

The onset of COVID-19 has introduced new challenges related to patient monitoring, reducing the spread of infection and maintaining a separation between those who have contracted the virus and those who have not. As the world has experienced a shift in how day-to-day operations are conducted, security manufacturers have begun tailoring their solutions to address these new demands.

When dealing with an environment as complex as a hospital, it’s crucial to understand the many facets that go into hardening the security of the facility, while simultaneously maintaining an open environment dedicated to patient care.

 

How access fits

Whether it is in the heat of an emergency or simply going about a normal day, hospital employees must have frictionless access requiring minimal user interaction to secure areas that they are authorized to enter. This fact requires identity management and access control systems that are easy to use, fast and reliable. Various smart card readers and access control solutions, utilizing RFID, NFC, or UHF technologies, can be implemented to fit this environment. The locking mechanisms that are chosen for hospital entryways should incorporate these same aspects.

The doors that need to be protected in a hospital can vary greatly in their needs for locking mechanisms and access systems, ranging from external-facing entryways to smaller cabinets that contain sensitive pharmaceuticals. These could be implemented as new areas of a hospital are constructed or they might need to be retrofitted onto current rooms to replace outdated equipment. In any case, the solutions need to work well with the hospital’s needs and current systems.

In addition to monitoring employee access rights, hospitals also need to track critical assets to ensure they haven’t been lost or stolen. This can include tracking where wheelchairs and gurneys are stored on the campus or tagging packages that are at high risk of theft, such as medication like painkillers. These and other customizable applications can be accomplished by using RFID and NFC tags. The same solutions can be used to monitor the location of infants or patients at risk for wandering, or to trace the movements of a patient who may be infected with COVID-19.

Smart card credentials and readers can handle allowing or denying access, but they are even more powerful and agile when paired with a physical access management platform. These platforms can track movements and easily change parameters around access for certain users or times of the day. The specific needs for access points, which may change over time, could impact the locking mechanism needed for one doorway or another throughout a hospital environment.

 

The future is touchless

While accessibility has always been a goal of healthcare access control and ID management, COVID-19 has further exasperated this need. With the threat still genuine, frictionless, hands-free solutions are a crucial part of any organization's efforts to create a healthier, more hygienic environment and healthcare facilities are no exception.

A well-designed access control system should allow people to go about their daily lives freely, but still provide peace of mind when it comes to security needs. Regardless of the ease of a platform, it needs to deliver an adequate level of protection to eliminate unauthorized access.

Mobile applications leverage Bluetooth and capacitive technologies to allow for complete frictionless access. Loaded on to a user's smart device, the mobile application acts as a physical credential. A doctor or nurse can keep their mobile device in their pocket, then wave their hand near the reader and the door unlocks. This is especially useful in fast paced settings, such as a hospital, where frictionless solutions can streamline operational efficiencies. Users are also less likely to lose their phone than they are a traditional access control card, making this a far more secure option that takes advantage of the constant connectivity in today’s world, while simultaneously reducing touchpoints and, in turn, the risk of spreading infection.

Frequent touchpoints, like punch clocks, can easily be replaced by contactless technology. Smart card readers with multiple frequency options and a keyboard emulation are perfect for facilities that use a mixture of techniques for logical access. Integrating easily with most time and attendance systems, employees tap the card to the reader to clock in for the day.

 

Contact tracing

Contact tracing within access control is another way to proactively and reactively protect patients and visitors. If a person enters a hospital and is later found to be symptomatic of an illness, some access control systems can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. While this is useful during the days of COVID-19, it can also be used for other applications, such as seasonal influenza

When choosing to invest in any type of frictionless access control, it is vital to keep in mind that the system needs to adhere to your internal requirements and must have room to grow over time. It is also important to note that not all systems come equipped with contact tracing. But overall, frictionless access control will continue to see increased demand following the pandemic, as more organizations move away from older technologies and make way for more secure, less complicated techniques.

 

Solutions to meet these goals

The goal in access control within healthcare environments is very similar across all applications — keeping the wrong people out while letting the right people in. But concerns related to COVID-19 have forced every market to re-examine their identity management and access control strategy, with new tools being released regularly to combat the spread of infection.

While there are many ways to approach identity management, one thing is for certain: it is an ever-changing landscape that is constantly improving. With technological trends like touchless access control and contact tracing gaining traction, the healthcare industry will continue to see significant change in how it approaches identity management to protect patients, employees and assets.

 

KEYWORDS: COVID-19 facility security healthcare security identity (ID) management patient safety

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brooke grigsby identiv

Brooke Grigsby is Director of Marketing for Safetrust. She has been active in the security industry for over 15 years. She has held marketing leadership and management roles in cybersecurity, physical access security, and the Internet of Things (IoT) segment. Grigsby is currently responsible for leading the marketing efforts at Safetrust, a leader in secure, virtual credentials headquartered in Fremont, California. Previously, she led marketing at ActivIdentity (now owned by HID Global), idOnDemand (acquired by Identiv) and Identiv. She is an active member of ASIS, SIA, and the NFC Forum.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0721-Tenant-Feat-slide1_900px

    Identity management for multi-tenant buildings

    See More
  • nurse with mask

    The future of healthcare visitor management will leverage biometrics

    See More
  • Diamond tunnel

    Thriving in 2030: The future of compliance and risk management

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!