Sei sulla pagina 1di 16

Security Management EDUMATERIALS

HCS/446 December 2, 2013

HCS 446 Learning Team D

Overview of the Environmental Impact Issue


Security

risk assessment should be conducted Security designs should be appropriate for the environment Design considerations should could coordinate with the security plan Five layers of security

Certificate of Need (CON) Program


Goal

Purpose
Application

Process and OCHA Response

The Office of Health Care Access (OCHA Program and Process)


Purpose

and Role OCHA Authorities Issues to Consider for International Building Code for a Facility

Security Management Purpose


Prevents

acts of violence, crime, and terrorism Prepare for emergency incidents Protects patients Protects employees

Security Management: In Redesign and Renovation


Security

risk assessment Defined zones of protection Environment addressed form outside inwards

Stakeholders Who Play a Role in Security Management


Stakeholders

are individuals who may be influenced or involved or have an affect on an effort.

Physicians Staff The Community Health Care Service Providers Suppliers

Areas of Risk
Inpatient

and Outpatient Facilities Emergency departments Mental health areas Pharmacies Cash collection areas Utility, Mechanical, and Infrastructure Areas Biological, Chemical, and Radiation Areas

Ways to Improve the Environmental Impact: Possible Suggestions or Solutions


Involving

senior leadership early Water should be annually checked Occupants from diverse experiences, facilities, and backgrounds can impart his or her insights

What measurements can be done in advance of the new plan or renovation?


Inspection

Defaults
Maintenance

prevention

Security Checks
Interior

security check (old and new) Electricity Water Supply

Yearly Maintenance
Code

and compliance Utilities

Conclusion
Security is one thing that does not come to mind at the start of a project in too many cases. Tackling security early in renovation or new planning of a health care facility is significant for organizing an efficient strategy. Security procedures and building arrangements originated a decade or more to provide maximum security is generally vulnerable. It is considerably easier to construct a secure facility with personal knowledge of the arrivals and departures of personnel, visitors, and interdepartmental workflows. That way it is feasible to determine security areas and plan accordingly.

References
Carr, R.F. (2012). Hospital. Retrieved from http://Carr,Robert F., November, 11, 2013 Health Community Tool Box. (2013). Identifying and analyzing stakeholders and their interests. Retrieved from http://ctb.ku.edu/en/table-ofcontents/participation/encouraginginvolvement/identify-stakeholders/main Health Resources and Services Administration. (2013). Who are the key stakeholders for the project. Retrieved from http://www.hrsa.gov/healthit/toolbox/HealthITAdoption toolbox/StaffingandExpertise/keystakeholders.html

References
International Association for Healthcare Security &Safety. (2012). Security design guidelines for healthcare facilities. Retrieved from http://www.campussafetymagazine.com/files/ resources/designguidelines2012.pdf Klinedinst, R. (2006). Planning data center renovations with an eye on security. Retrieved from http://www.facilitiesnet.com/security/article/SecurityQuandary-Who-Goes-Where--4466# Tucci, T.J., & Nichols, B.D. (2008). A guide to Connecticut's certificate-of-need process. Conn Med, 72(6), 351-2.

Potrebbero piacerti anche