Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Hospital and Healthcare Security -  Russell Colling,  Tony W York

Hospital and Healthcare Security (eBook)

eBook Download: PDF | EPUB
2009 | 5. Auflage
720 Seiten
Elsevier Science (Verlag)
978-0-08-088602-2 (ISBN)
Systemvoraussetzungen
Systemvoraussetzungen
65,95 inkl. MwSt
(CHF 64,40)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Concerns about healthcare security have proliferated in recent years, with one recent study reporting that 17% of registered nurses surveyed had been physically attacked at work over a 1-year period. From privacy concerns to the mandates of the Health Insurance Portability and Accountability Act (HIPAA) to the rapid growth in the number of aging and ailing baby boomers, healthcare has undergone dramatic change, and security in hospitals and other settings must keep pace. Most educators, healthcare executives, and healthcare agencies and associations agree that Hospital and Healthcare Security, a Butterworth-Heinemann classic, has set the standard of care for healthcare security systems and programs.

Hospital and Healthcare Security, 5th Edition, builds on the solid foundation laid down by Russell Colling in the first four editions, covering the shifts that have occurred in healthcare security since the last edition appeared in 2001. The new co-author, Tony York, is a well-regarded security professional and a past president of the International Association for Hospital Security and Safety (IAHSS). This new edition has been reorganized and rewritten to cover new healthcare security topics and issues, particularly in licensing, regulatory requirements, litigation, and accreditation standards in the US. The authors have added a full range of corresponding examples, not only from the privately funded US system but also from national healthcare systems in UK and Canada.

This new edition expands the scope of Colling's foundational work and focuses its coverage of legal and operational issues to bring this vital information to a new and broader audience.



FEATURES AND BENEFITS:
* Practical support for healthcare security professionals, including operationally proven policies, and procedures
* Specific assistance in preparing plans and materials tailored to healthcare security programs
* Summary tables and sample forms bring together key data, facilitating ROI discussions with administrators and other departments
* General principles clearly laid out so readers can apply the industry standards most appropriate to their own environment
NEW TO THIS EDITION:
* Quick-start section for hospital administrators who need an overview of security issues and best practices
Hospital and Healthcare Security, Fifth Edition, examines the issues inherent to healthcare and hospital security, including licensing, regulatory requirements, litigation, and accreditation standards. Building on the solid foundation laid down in the first four editions, the book looks at the changes that have occurred in healthcare security since the last edition was published in 2001. It consists of 25 chapters and presents examples from Canada, the UK, and the United States. It first provides an overview of the healthcare environment, including categories of healthcare, types of hospitals, the nonhospital side of healthcare, and the different stakeholders. It then describes basic healthcare security risks/vulnerabilities and offers tips on security management planning. The book also discusses security department organization and staffing, management and supervision of the security force, training of security personnel, security force deployment and patrol activities, employee involvement and awareness of security issues, implementation of physical security safeguards, parking control and security, and emergency preparedness. Healthcare security practitioners and hospital administrators will find this book invaluable. Practical support for healthcare security professionals, including operationally proven policies, and procedures Specific assistance in preparing plans and materials tailored to healthcare security programs Summary tables and sample forms bring together key data, facilitating ROI discussions with administrators and other departments General principles clearly laid out so readers can apply the industry standards most appropriate to their own environment NEW TO THIS EDITION: Quick-start section for hospital administrators who need an overview of security issues and best practices

Front Cover 1
Hospital and Healthcare Security 4
Copyright Page 5
Table of Contents 6
Acknowledgements 14
IAHSS Healthcare Basic Security Guideline Placement 16
Chapter 1. The Healthcare Environment 18
Categories of Healthcare 19
Types of Hospitals 20
Nonhospital Side of Healthcare 21
Diverse Stakeholders 22
Staffing the Medical Care Facility 22
Physician Role Impacted 23
The Healthcare Security Administrator 24
The Joint Commission 24
Health Insurance Portability and Accountability Act (HIPAA) 31
The Centers for Medicare and Medicaid Services (CMS) 32
Chapter 2. Protecting a Healing Environment 36
Defining Healthcare Security 36
Basic Rationale of Healthcare Security 38
Evolution of Healthcare Security 39
Security, Risk Management, Safety 42
Developing the Security System 44
Psychological Deterrents 44
Basic Security Program Objectives 49
External Forces 52
Body of Knowledge 62
Chapter 3. Security Risks and Vulnerabilities 68
Basic Healthcare Security Risks/Vulnerabilities 69
Primary Security Risks 69
Facility Security Risk Assessment 89
Chapter 4. Security Management Planning 102
Security Management Plan 102
Security Strategic Plan 117
Chapter 5. Managing the Basic Elements of Healthcare Security 124
Customer Service 128
Maintaining an Orderly Environment 128
Preventative Patrol 129
Incident Reporting and Investigation 129
Response to Requests for Service 130
Security Communications 133
Parking and Traffic Control 134
Accident Reporting and Investigation 134
Security Education and Training 135
Applicant Background Investigation 136
Reaction to Internal and External Emergencies 136
Enforcement of Rules and Regulations 137
Access Control 137
Liaison with Law Enforcement and Other Government Agencies 139
Internal and External Audits 140
Locks and Keys 141
Other Support Services 141
Public/Employee/Community Relations 147
Chapter 6. Security Department Organization and Staffing 148
Security Function Reporting Level and Support 148
Types of Security Staff 153
Chapter 7. Security Force Administration 176
Management 176
Supervision 181
Relationship with Officers 189
Motivation 189
Performance Management 190
The Security Officer 193
Selecting Security Personnel 196
Full-Time Versus Part-Time Security Officers 204
Wage Compensation 206
Retention 207
Performance Expectations 207
Chapter 8. Security Attire and Equipment 216
Uniforms 216
Use of Firearms 223
Other Equipment Considerations 232
Use of Force 243
Training 244
Security Operations Manual 244
Chapter 9. Training and Development 248
Training Concepts 250
Types of Training 251
New Security Officer Training 252
IAHSS Progressive Certification Program 263
Specialized or Supplemental Training 268
Elective Training 272
Leadership Development 272
Training Resources and Records Requirements 275
Chapter 10. Deployment and Patrol Activities 282
Flexing the Security Staffing Plan 283
Deployment Objectives 284
Scheduling the Security Staff 285
Deployment Patterns and Concepts 287
Post Assignments 288
Basic Patrol Deployment Plans 289
Patient Care Units/Areas 293
Entrances and Exits 294
Basic Patrol Concepts 294
Security Officer Response 309
Patrol Problems 310
Chapter 11. Program Documentation 312
Purpose of Records 312
Administrative Records 315
Computer-Generated Reports 317
Basic Records 318
Security Supplemental Report 324
Security Condition Report 324
Chapter 12. Patient Care Involvement 334
Patients 336
Assisting with Patients 338
Patient Risk Groups 351
Patient Property 368
Visitors 370
Chapter 13. Public Safety Liaison 376
Dynamics of Security and Law Enforcement Liaison 376
Police and Security Cooperative Programs 378
Requests for Law Enforcement Service 379
Police Interaction with Patients and Employees 381
Security and Law Enforcement Liaison 388
Security and Nonpolice Liaison 389
Chapter 14. Human Resources and Staff Responsibilities 392
Human Resources Office 392
Selecting Staff Through Due Diligence 393
Applicant Suitability Information 394
Employment Application Forms 395
Applicant Background Verification 395
Deceptive Applicant Information 396
Background Screening Providers 396
Security Role in the Hiring Process 397
Staff Identification Badges 398
Security-Oriented Employment Guidelines 401
Chapter 15. Employee Involvement and Security Awareness 410
Employee Security Education and Motivation 410
Hospital Watch 422
Chapter 16. Investigative Activity 424
Fair Credit Reporting Act (FCRA) 425
Security Versus Police Investigation 425
Types of Investigation 426
Incident Investigations/Two Phases 428
Investigator Attributes 433
Interviewing and Interrogation 434
Undercover (Covert) Investigations 435
Employee Informants 437
Chapter 17. Physical Security Safeguards 440
Basics of Physical Security 440
Designing a System of Perimeters 441
Barriers 441
Lighting 445
Trees and Shrubs 446
Locks and Keys 447
Seals 453
Glazing (Glass) 453
Fastening Down Equipment 454
Marking Property 455
Safes 455
Signage 456
Crime Prevention Through Environmental Design 458
Chapter 18. Electronic Security System Integration 460
Security Master Plan 462
Security Design Considerations 463
The Central Security Station 464
Alarms 467
Access Control 471
Video Surveillance 475
Other Security Technology Applications in Healthcare 488
Testing of Security System Components 497
Security Technology Implementation Tips 497
Chapter 19. Preventing and Managing Healthcare Conflict and Violence 500
The Who (Perpetrators/Visitors) 504
The What and the Why 508
The When and the Where 509
The Management of Healthcare Violence 509
Preventing Violence in the Workplace 513
Chapter 20. Security Sensitive Areas 522
Security Sensitive Areas 522
Infant Abductions from HCFs 525
Identification 530
ED Security 544
The Hospital Pharmacy 556
Chapter 21. Areas of Special Concern 564
Health Information Management 564
Child Development Centers 573
Business Office/Cashiers 574
Information Technology 574
Intensive Care Units 576
Gift Shops 576
Compressed Medical Gases 576
Food Service 578
Roof Areas 578
Chapter 22. Off-Campus Considerations 580
The Need for Off-Campus Facilities and Services 580
Chapter 23. Parking Control and Security 594
Types of Parking Areas 596
Parking Shuttle Service 601
Valet Service 602
Types of Parkers 602
Automated Controls 604
Traffic Flow and Space Allocation 604
Pay-for-Parking 604
Parking System Violators 605
Chapter 24. Emergency Preparedness—Planning and Management 608
Basics of Emergency Planning 608
Primary Manmade Emergency Events 614
Accidental and Natural Emergency Events 631
General Administrative and Operational Issues 632
Chapter 25. A Primer for Healthcare Executives 638
Glossary 666
A 666
B 667
C 667
D 668
E 669
F 670
G 670
H 670
I 671
J 672
K 672
L 672
M 672
N 673
O 674
P 674
R 675
S 675
T 677
U 678
V 678
W 679
Appendix I: Monthly Occurrence Report 680
Appendix II: Security Services Request for Proposal 686
Index 696
A 696
B 700
C 702
D 706
E 708
F 714
G 716
H 716
I 719
J 723
K 723
L 723
M 726
N 728
O 731
P 732
Q 740
R 740
S 743
T 754
U 755
V 756
W 758
X 759
Y 760
Z 760

PDFPDF (Adobe DRM)
Größe: 4,6 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

EPUBEPUB (Adobe DRM)
Größe: 8,0 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich

von James E Cooper

eBook Download (2023)
Opportune Independent Publishing Co. (Verlag)
CHF 9,25