Building on the foundation of the previous five editions, Hospital and Healthcare Security, 6th Edition includes new and updated chapters to reflect the current state of healthcare security, particularly in data security and patient privacy, patient-generated violence, and emergency preparedness and management. The recognized leading text in the healthcare security industry, Hospital and Healthcare Security, 6th Edition explains the basics as well as higher expertise concerns, such as the roles of design, emergency management, and policy. Conveying a wide spectrum of topics in an easy to comprehend format, Hospital and Healthcare Security, 6th Edition provides a fresh perspective for healthcare security professionals to better prepare for security issue before they occur.
- Offers a quick-start section for hospital administrators who need an overview of security issues and best practices.
- Includes a sample request for proposals (RFP) for healthcare security services and incident report classifications.
- General principles clearly laid out so readers can apply internationally recognized industry standards most appropriate to their own environment.
- The new edition includes materials that address the latest issues of concern to healthcare security professionals, including security design, emergency management, off-campus programs and services, and best practices in mitigating patient-generated violence.
Table of contents
- Cover image
- Title page
- Table of Contents
- About the Authors
- Special Acknowledgement of Russell Colling
Chapter 1. The Healthcare Environment
- Categories of Healthcare
- Types of Hospitals
- Nonhospital Side of Healthcare
- Diverse Stakeholders
- Staffing the Medical Care Facility
- The Healthcare Security Administrator
- The Joint Commission
- The Environment of Care Committee
- The Centers for Medicare and Medicaid Services
- Health Insurance Portability and Accountability Act
- Chapter 2. Protecting a Healing Environment
- Chapter 3. Healthcare Security Risks and Vulnerabilities
- Chapter 4. Security Management Planning
Chapter 5. Managing the Basic Elements of Healthcare Security
- Customer Service
- Maintaining an Orderly Environment
- Preventative Patrol
- Incident Reporting and Investigation
- Response to Requests for Service
- Security Communications
- Parking and Traffic Control
- Accident Reporting and Investigation
- Security Education and Training
- Applicant Background Investigation
- Reaction to Internal and External Emergencies
- Enforcement of Rules and Regulations
- Access Control
- Liaison with Law Enforcement and Other Government Agencies
- Internal and External Audits
- Locks and Keys
- Other Support Services
- Public/Employee/Community Relations
- Chapter 6. Security Department Organization and Staffing
- Chapter 7. Leadership and Professional Development
- Chapter 8. The Healthcare Security Officer
- Chapter 9. The Security Uniform and Defensive Equipment
- Chapter 10. Training and Development
- Chapter 11. Deployment and Patrol Activities
- Chapter 12. Program Documentation and Performance Measures
- Chapter 13. Patient Care Involvement and Intervention
- Chapter 14. Human Resources and Staff Responsibilities
- Chapter 15. Employee Involvement and Security Awareness
- Chapter 16. Investigative Activity
- Chapter 17. Security Design Considerations for Healthcare
- Chapter 18. Physical Security Safeguards
- Chapter 19. Electronic Security System Integration
- Chapter 20. Preventing and Managing Healthcare Aggression and Violence
- Chapter 21. Areas of Higher Risk
- Chapter 22. Areas of Special Concern
- Chapter 23. Parking and the External Environment
- Chapter 24. Nonacute Facilities and Off-campus Programs and Services
- Chapter 25. Emergency Preparedness: Planning and Management
Chapter 26. A Primer for Healthcare Executives
- What Basic Objectives Should We Have for the Security Program?
- What Leadership Characteristics Should the Healthcare Security Administrator Possess?
- Where Should Security Report?
- What Customer Service Expectations Should Be Established for Security?
- Why Do I Need a Security Master Plan?
- How Do We Identify Our Security Risks and Vulnerabilities?
- Does the Community Standard have a Role?
- The Security Staffing Model: How Large a Staff Is Needed?
- Security Training: What Should I Expect?
- How Do I Know My Security Staff Are Competent?
- How Much Involvement Should Security Have with Patients?
- What Type of Uniform Should Security Officers Wear?
- What Use of Force Options Should Be Made Available to Our Security Staff?
- How Should Security Be Designed into the Healthcare Facility?
- How Important is Access Control?
- Where are Alarms Needed?
- Why Invest in Video Surveillance?
- What Other Security Technology Applications Should be Considered?
- The Investment in Security Technology Has Been Made, But How Do We Know it Works?
- How Concerned Should We Be about Violence in Healthcare?
- Are We Doing Enough to Protect Our Infant and Pediatric Patients?
- What Should We Do Differently to Manage Forensic/Prisoner Patients?
- Are We Doing Enough to Protect the Privacy of Our Data?
- How Do We Get Employee Involvement in the Protection Effort?
- What Security-related Policy and Procedures Do I Need?
- What Performance Metrics Should I Be Using for Benchmarking My Security Program?
- Mental Health Physical Security Review Checklist
- Sample Healthcare Security Request for Proposal
- Title: Hospital and Healthcare Security, 6th Edition
- Release date: February 2015
- Publisher(s): Butterworth-Heinemann
- ISBN: 9780124200623
You might also like
The Cyber Risk Handbook
Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide …
Python Crash Course, 2nd Edition
This is the second edition of the best selling Python book in the world. Python Crash …
IT Security Risk Control Management: An Audit Preparation Plan
Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of …
The Definitive Guide to Java Platform Best Practices–Updated for Java 7, 8, and 9 Java has …