Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalTechnologies & SolutionsAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityCase Studies (Physical)Hospitals & Medical Centers

Infant protection: Advanced technology can ease the burden on healthcare security personnel

Infant protection technology for healthcare security
May 25, 2021

After a series of high-profile cases of missing children, the Reagan Administration established National Missing Children’s Day in 1983 to highlight the need to make child safety a priority. Every year on May 25, attention is given to policies and other efforts that reduce the risk of children going missing and focus on bringing missing children home.

Since 1964, an average of five to six infants have been abducted each year, with 42.6 percent of those abductions happening in health care facilities. Safety of infants after birth is as important as any prenatal safety efforts during the length of their stay in a hospital. Ensuring infant security is critical to not only the reputation of the hospital, but also to the peace of mind of every person there, from nursing staff to new parents.

In hospital settings, infant abductions historically follow a similar pattern: a woman of child-bearing age routinely visits a hospital maternity ward to obtain information on procedures and hospital layout, impersonates a nurse, and gains the trust of new parents. They frequently use fire exit stairwells to avoid being detected as they leave the facility.

Over the years, hospitals have taken significant action to safeguard infants, new mothers, and their facilities against abductions, and to ensure that each infant is correctly matched with its mother or legal guardian. These strategies include educating new parents, electronic security measures, and comprehensive protocol for staff. It has been estimated that approximately 80% of hospitals in the U.S. use some form of electronic matching for babies and parents. In a proactive effort to maintain preparedness and security, hospital staff also frequently conduct Code Pink drills to practice abduction responses and reinforce the need for everyone to be alert for any unusual behavior.

Automated infant protection systems are modern tools that go beyond basic infant ID systems to complement and back up a hospital security team’s procedures. These systems have become more sophisticated in recent years and can enhance the ability of security officers, risk management personnel, and nursing staff to work as a coordinated team to protect new mothers and their most vulnerable patients – infants.

Benefits to using a smart infant protection system

Following delivery, new mothers are experiencing shortened stays in the maternity ward and hospitals are increasingly moving away from the use of nurseries in favor of keeping infants in the room with the mother following birth. While good for parental bonding and other added benefits, the combination means newborns are more vulnerable as they spend most of their time in an area that is easier to gain access to and where a potential stranger impersonating hospital staff is more likely to go undetected. While infants and new mothers are in the hospital, security personnel and hospital staff are responsible for their safety no matter where they are located in the facility.

The impact of an attempted or successful infant abduction often produces devastating effects to the infant's family, hospital staff, and surrounding community. A smart infant protection system adds heightened security to existing systems and protocols, and provides peace of mind as new mothers focus on recovery and bonding with their child. The hospital's security officers and administrators also benefit significantly from the enhanced protections, improving patient safety and the facility’s reputation. By investing in a reliable, automated infant protection system, families and caretakers can rest assured that infants are protected 24/7.

How automated infant protection works

Infants protected by a real-time location system (RTLS) wear small, comfortable, and discreet electronic sensors that monitor their location throughout the hospital’s campus. These waterproof sensors include umbilical attachments and ankle bands that use skin-sensing tamper detection. The sensors actively communicate with the integrated system which generate instant alerts at the nurse’s workstation and logs the event in the system’s database if the device is removed from the newborn's skin, tampered with, or stops communicating with the system.

Similar to the newborn, mothers are also fitted with a lightweight electronic sensor that enable staff members to ensure proper mother-baby matching and provide confidence to families that they’re bonding and returning home with the correct infant.

Automated infant protection solutions offer facility-wide safety for newborns, mothers, and staff. For added defense, some systems are available with clinical-grade locating technology for advanced patient visibility, extreme accuracy, and enhanced reliability.

Advanced capabilities of automated systems

Advanced automated infant protection systems offer integrations that go beyond alerts that make maternity wards and hospitals more secure than ever before. Infant protection solutions that utilize a real-time location system with clinical-grade location capabilities identify an infant’s location with high specificity – such as the exact patient room, bay, facility hallway, or stairwell. These systems integrate easily and quickly with other security and access control systems that facilities may already have in place.

When powered by RTLS, infant protection systems can document a potential abduction as it unfolds and complement the security team’s procedures as they respond to alerts. If an unauthorized attempt to leave a monitored area with a protected infant occurs, the system will instantaneously set off an alarm, activate door locks and disable elevators to lockdown the unit, and capture video of the incident. In addition, nursing workstations display facility floor plans of monitored areas and actively communicate the real-time location of infants. The workstation also shows the protected exits and stairwells and issues automated alerts when it detects an infant tag is approaching.

These advanced systems provide the additional protection hospitals require, while still allowing patients, visitors, and hospital staff access to the unit. Through easy-to-use software applications, clinicians and security personnel gain a reliable partner to protect the infants, parents, and the facility.

In addition, these systems are dependable, vigilant, and unaffected by distractions, staff breaks, and shift changes. And, while they are a strong deterrent in the first place, they also allow for a quick response should an abduction attempt occur.

Selecting the ideal solution

When seeking enhancements to existing security and location-based systems, finding a provider that offers interoperability, accurate technology, and end-to-end automated solutions ensures reliability through proper design, implementation, testing and maintenance. Selecting a partner with a comprehensive suite of RTLS solutions also makes it easier to expand the system in the future as new needs arise. For instance, an integrated system could include not only infant protection solutions, but also staff duress solutions which rely on location technology to alert security personnel when a staff member is under duress and provide an accurate location so they can receive immediate assistance.

Each year, National Missing Children’s Day draws attention to the importance of developing greater protection for vulnerable children. Since more than 40 percent of all infant abductions occur in hospitals, it is crucial for security officers and directors to continue augmenting safety protocols and systems to protect newborns and their parents.  

 

KEYWORDS: healthcare healthcare facility healthcare industry healthcare safety healthcare security Infant abduction infant abductions kidnapping physical security physical security systems

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security-guards-fp1170x658.jpg

    How security technology empowers onsite personnel

    See More
  • armoured vehicle protection

    Security on the go: The next generation of vehicle protection

    See More
  • Bob Burke

    5 minutes with Bob Burke – The importance of advanced MFA technology

    See More

Related Products

See More Products
  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • Physical Security and Environmental Protection

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing