You are on page 1of 20

UNIT 3 SECURITY ORGANISATION AND

MANAGEMENT

Structure
3.0 Objectives

3.2 Security Threats and V~~lnerabililies


of Hospitals
3.2.1 Threats and Vulnerabilities of Hospitals
3.2.2 Threat Groups
3.3.3 Security Scnsitive Aruas/Functions of Hospilals
3.2.4 Strategic Securily System
3.2.5 Concl~~ion
3.3 Role and F i ~ n c t i o ~of'securily
y as a Selavicein Hospitals
3.3.1 liolc of I-lo'sl~itnlSecurity
3.3.2 Functions ol'l-lospitnl Security Department
3.3.3 Non-truditic~nal"Service" Functions
, 3.3.4 Conclusion '

3.4 Security Organisation and Physical Securily Mca.5~1l.c~


3.4.1 Securily Organisation
3.4.2 Thc St'ill' Complement
3.4.3 .
Physical Security Me*dsures
3.4.4 Perimeter Protection Sysleln
3.4.5 Implementing ~ h ~ d cControls
al
3.4.6 Conclusion
3.5 Access Control Concepls
3.5.'1 Defining Acccss Control
3.5.2 Means and Components
3.5.3 Conclusioo
3.6 Integration ol'Sccurity Technology
3.6.1 Nceil for Security Technology
3.6.2 Security Technology Plan
3.6.3 Colnputcr and lnfor~nationSecurity
3.7 Selection and Management oi3DepartmentalSecurily SlalTIContracl Security Agency
and Security Training,
3.7.1 System Choice
3.7.2 Selection of Con~raclSecurity Agency
3.7.3 Verification of Security Personnel
3.7.4 Security Staf' Discipline
3.7.5 Security Training

3.X Security and Law


3.8. I Introduction
3.8.2 Sonle Basic Provisions of the Jndian Penal Code (IPC) - Concertring Security
1
3.5.3 Authority lo Arrest, Use Force, Conduct Senrchcs. Frisk, Inspect. lntcrtogate ancl
In~erview
I
I Snfciy and Risk M a n a g e ~ ~ ~ e l ~ t 3.8.4 Reporting Proccclure
I t
<
3.8.5 Conclusion
3.9 Strategic Security Plai i~ldStr~l~dnig
Securlty IJohcics ant1 Procedurcs
3.9.1 Introductlotl
3.9.2 Effechve Security Managemenl 111 Ho\pltal\

I 3.9.3 Central Security Conhol Rootn


3.9.4 Patrols cmd Post Proceclu~~ea/l'ccl~n~que.;
3.9.5 Conk01 of Vl~ltnrs/OPDPa~~cnlslAttend.lntr
3.9.6 Standing Instmctions I'or Seculity of Ca.sh
3.9.7 Security Budgeting
3.9.g Sccunty Colnrnirtee
3.9.9' Pniodic Security Audit nnd tlpdahng of Sccunty Procedules
3.9.10 donclusion
3.10 Security-related CrisisIDisastcr M;tnagcment in Hospilals
3.10.1 Introduction
3.10.2 Types of Dlsaste~s
3.10.3 Preparing for ;r Dlsaster
3.10.4 Bomb Thre;il/Response
3.10.5 Conclusion
3.11 Gods and Objec~ivesof Security M~ilgelllet~t
3.11.1 Goals
3.1 1.2 Objectives
3.1 1.3 Conclusion
3.12 Let Us Sum IJp
3.13 Answers to Check Your Progress

3.0 OBJECTIVES
After going through Ihis unil you should be able to:
a enumeriite tl~cgoals i ~ l dol~.ject.ivesof tlie securily mimalgeinent;
a describe rolc :u~dfunctiotis of security as ;I service in hospitals;
a filmiliarise with the various aspccls ul protcclion, loss prevention and security
organisation of llospilal adrizinistratiot~;
a explain the legal aspects of security;
0 discuss strategic security plai ant1 standing security policies and procedures; and
e describe security related disaster lniulagemenl in hospi1:~ls.

- -
3.1 INTRODUCTION

Iiospitals :u.c i~islitulioiis,similar to any otlier business orgmisalio~~,


engalged in providing
Quality IIc;ll~i~c.rrc. Tlicy, however, possess cerrain unique chirracLeristics, given below:

e ~ d caccess In jusl aboul anyoiic and :we "open l'or business" 24 llours a
They p r ~ \ ~ free
day, 365 tlnys in a yew They arc one 01' the 11lost "pcopic-intensive" places, where
everyday ti~~ictioils ate iillcd wlll~lift; and tlcnth, sorrow iuid tnuinph. The Out
Patient Dcptuuncnl (OPD) palic~lts:and visitors iu~tl;~trendiultsof palients colitribute
signific:ultly to h e floating population of tl~ehosp~lal.
e Tlie entire I~ospitalopcnites under cui~ti~lual
slress :und periodically experiences
@! periods of extreme stress, which may cause irrational, confrontationist beliaviout,
52 a giving rise to conflicts or cvcn aggression. I
e The people in or ne~u-;I hospil:~lgerlcrillly 1:lll inlo threc c,!tcgories -- pat~cnts, Security 111is:rtio11
v~silossor st;~ll'.'l'lle I Iospilal Security Organ~salionmust undc~stand 1111sgrouping, and ilgelllc llt

since security will have :I difl'crci~l:~ntldist~nctrelat~onshipwit11 eich group.


The hospital security slal'l', duly aulllorisctl by manage~ncnt,present ;I visible image
o i ;I "service" to lhc palients, visitors :ultl stal'f, cc.;lreruIlycombining it with Uie
l'und:~nei~li~lobject~vcof sccurily, ~vliichis protection ol' people :ad Lhe assets. 'rile
security fr~~ictiori:lrymay he tlie i'irhl or last Iiospital employee, ii patient or visitor
may see. A sccurily stal'l'snnply s;~ying"Wclcome to AUC 1Iospit:ll" or wishing
'Jaihind' tau rcd~lcciuisiely ol'a visilos/]~alie~~t. Wllatever tzlsksare performed,
wlietller it is liell~i~ig
someone tilid ;I Ila1)oratoryor :I I)atliroom or taking a theft
or accident report, these fnllctio~lssllotnld 1)eperformed with energy, enthusiasm
and in ;i civil n~ltlpolite mailllel-.

9 Regrettitbly, Lhc oul-lnotlcd sysr:ein ol' 'C:l'io\vl<idars'at 1 . 1 1 ~enlry points conlinucs to


be the m:.liil constitucnl 0 1 ' securily in most hospitals in 111iliil. Eve11Lhe govenl~nenl
iuid lnost privrltc hospirals 1;lclr an eRicicnl sccurity system.

a I-Iospil;~lSccuriLy Sli~Sl'otcinhc~silccd lo be L:~ctl'ul.scns~live,patiel11uld rliplonlatic,


while tlenling wit11s ~ l u ; ~ t ~IIIo ;Ii ~suessli~l
s c~~v~rc~nincnl.

It Ilas to bc rc:~lizctl1Ili1I 11ospi~:~Is ; ~ 1101011~~1.


ill l i ~ i l i :LIT: SIICIICI~CCIo r iso111tcdl'rO1ll L~IC
strifes iuld anxiclics of onr socicly. 'l'llc I~ospi~;~ls too 11;lvclo klce up to llle growi~~g
ch:~llenges,Wllilc 110 d;.~t:~basc is it~ililablc01' losscs ill tllo Inr1i:ul hospil:~ls,a study can-ietl
out in Ule USA india~r.cslhnl Lhe hospitnls lnsc around 10%)oftheir pnrcll;~sein\rentory tluc
to pseveutable securily l:lpsi.slrnis-n1:~11;1gcmcn1. l'hc hasic causes :u.c p1-imarilyattribuhble
to Security in Hc)spilaIs,beil~gLr'cnlctl ;IS ;I ~~criphcral l'u~~ction, nr.l.llcrlh:ln a vital ol).jcctive
of top nl:l~lilge~nents fi)r protectioi~of tlie fnchlity's totirl assets-p~-ol)erty, !;tuff,
patients, image :111(l i~iibl-~niitictn ;iocl of coa~l-scto esl;~l)lisliii systcnl of s:rfeg~~srtls
"designed to ilchievu rcliitive safety f i ~ ill1 r pcl.sons inter-:lctilig witliili tlie Iiospiti~l:~n(l
its environment".

Wliile opcralional spec^ 01' Sccuritl Mani~gcmcolis 111~~ C S ~ I ~ I I S I 01~ ~Lllo I I sccurity
I~~
executive and tl~cirstalfs, Ihc lop m;~n:~:!emci~t ol'a hospiri~lis ?t:spons~l~lc lo lay-down Lhc
policy Sriunc-work to inlegtalc "C'omprchci~sivcScc~nity"111 org:~nisat~o~~:~i cu1lul.c of :I
llosp~tal,to i~cllicvc1,oss l)revc~llinn. \NI:ll-org:u~~serl Ilosl>it;~l
scr.urily dcparlment and wcll-
traincd sccurily st;ll'l'shoulil pro-act~velyasslsl in crcating an almosphcrc of snl'ety,
goodwill, service a~ndl ~ u i i ~colicern
a ~ ~ l so Lh:ll 1111: 'l':~licnl-('me' call coi~tiiiue~llldist~~rbed.

Fill in the h1:mks:

1) Tile security liu~ctioni~ryinuy I)c rllc ....................................or ....................................


hospital cmployce iI p:llicllt or visitor lni1y scc.

2) Tile lop mwlalt,cmcntof :I 11ospil:~lis rcsponsihlc to Illy clown the ......................,............


.
..
................... ........to inrcgratc "Compi~cl~c~~sive Sccurily" in orgar~~isational
culture of a hospital to acl~ieve...................................

3.2.1 Threats arid Vulnerabilities of E-Iospitals


' 'unseen' vulnerahililics.A vulnerability in tlie
All hospi~idsarc liable lo ' s c c ~iuld
context of llospitals can he dulined as, "something tllat could Ici~dto in.jury, harm, or
threat to persons, property, ideals or imirge". As 110spiri1li~tl~ninistl'alors, you should
U1:1t your ioslituljon ]nay l'ac~,:ls no
faul~ili;uizeyoursel wit11 !lie specilic valiier:~bilil~es
two circumsti~~ces or locations or alikc. By untlcrs~anclingthcsc, you would be better
equipped to dirccl mtl mo~lilortllc securily depitrhncilt Coniinon threats :uld
vulnerabilities that a hospital may lhcc ire:
e Thefts -External or Internal
e Patients property losses
E~nployeesproperty losses
Destruction or damage of property including vehicle accidents, attributable to
negligencc, lack of trail~illgor out oTs11ccr ~naliceor cxteinal and natural causes
e Information losses, pertailli~~gto conlida~tiillor privileged information, medical
records of patients, research material ;uld colnputer security
e . Assaults or robbery upon employees, stafl' or visitors (workplace violerlce)
e Fire and arson
e Violation of work-safety nornis, including environlnerlt pollution, hazards to safety,
health and hygiene .
e Anti-national activities, e.g., bomb-thre;lts, s;ll)otage ;u~dsubversioil of employees
e Threats to 111edical and nun-medical executives or heir fi1111ily inembers

8 Drug theft (and d ~ u gabuse


e Internal or external disasters
e Metlical imposters
e White-collar crimes, like corrupt practices by unethical employees, in collusion with
outsiders or independe~~tly
e Cases of sexual assaull/molestatio~on the premises
0 Strikes or civil disturbiuices
e h&mt abduction

3.2.2 Threat Groups


The above threats may emanate from any of the following sources:

a Disgruntled patientslfonner patientslrelatives/cmployees/formeremployees or their


friends
e Members of the public with real or imagined grievances

3.2.3 Security Sensitive Areas/Functions of Hospitals


There are a number of places and functions, in 21 hospital, tl~iltcan be considered security-
se~~sitive.
Listed below are some of the niore sensitive areas/t'unctions of a hospital:

ef Pharmacy

e Cash handling areas (cashier, cafeteria, retail shops)


e Medical Records Office
e Emergency Department
Computer Centre
Inran t and Pediatric Units
Parking Areas
3.2.4 Strategic Security System Secllritg Orjirllisniic~l~
ur~clM P I G I ~ C I I I ~ I ~ ~
A pragmatic asscsstncnl by the hospital adininisrrator of sccurity vulnerabilities aid
visualization of threats musl for11 basis for formulation ol'aui el'ficicnt iuid cost-d'fccl~ve
securily ~nau~agc~neiitplan ol' i l liospital. 'l'li~swill help in providing 'Total' Secl~rity'for
pro-active Assets l'rotectio~l, security of staff awl patients and prevention /
nlinimization of loss of nliib-erials and infbrmatioo.

EIospitals hwc becoilic illcreasi~~gly atll'activc largels to crime, because of valuable


equipment, inatcrinls, :uiO drugs. A hospitirl administrator performs au anchor's role in
tile hospital sccurity systeni in iissessing anti ronstirntly updating the threats and
viilneral~ilities,lilyi~lgdown policies and directing andl monitoring the Secority
Organisation.

Checlt Your l'rogress 2

1) A11 liospilals I'acc the s:lmc lypcs ol' Ihrcat :~ntlvu1ncr:lbilities. l'rue/I:alse

2) Security of liospilal's assets is responsibility ol'llle Security SLnCl'alonc. TmcF:llse

3) Undcrsl;u~~lingllic scc11ril.prislcs would cquip a linspi La1 admiiiislrator to


direct and monitor tllc security clcpi~rtmenl. ?'ru e11~a~lse

4) Ilcslruction 01. tlnmagc lo llospilill properly can he atlributahlc to:

all ......................... .....


............................................................................4............
b) ......;. ................,. ... ............................................................................................
c) ......................... .
.........................................................................................,,:,...
d) .............................. ,.......................................................................................;.........
5 ) List five of thd more security-sensitive i~rc:u/hilicrioilsoCa.llospilal.
..."......
'...........,........'............................................................a..........4..a........................q.....

3.3 ROLE AND FUNCTIONS OF SECURITY AS A


SERVICE IN IIOSPITALS

3.3.1 Role of I-lospitalSecurity


Tlle role of hospital security depart~nentis, "to provide security services to rrll stal'f,
of 11osl)italproperty on the premises, through
patients and visitors and for :)rotectio~~
use of \rellptrained personnel, technology, prevention activities and tiinely respouse to
requests". 11i~ivolvesIreating people equally auld w i ~ htGl:ll care auitl respect, regardless o f
Iheir gender, religiai, agc, hantlicap or ;uiy olli~rfactor wllicli lllily put Uic~nill a miilorily
category.

3.3.2 Functions of P-Iospital Security Departnleilt


@ Analysis d'scurity llircats iuld vulncrahililies it1 co~ijunctionwith the mimagenall,
civil police iuld others.
@ Preparation of striitegic sec~wit.yplan, sccurily sliulding instructions imd securily
a l l ant1 llicir ~eriodicupd;lting, based oa direclions of tlle
operational d e ~ ~ l o ~ mpliut
mmagcment. 55
I '::Sul'ciy untl Risk h l u ~ i r g c ~ ~ i c ~ ~ i e Or~alisil~i()n aud incii!i!;-~ri~l:! G!' ; t .:'.I. i ~ i i ! ; 1i11tl i~n?lcn'lcntatiollot' Security
111 .' i [ i ~ ' ; ! ;
I
,:l 8
Plans to achieve elimiii:~t;i~ I I / ~ !I;,-,:\ . I ~oi' I Ilii..
I i r..iI,.(:01 I!~cli!pilSer:~geof property/
!,
inforination a n t 1 cl-in-LC.
011 ~~i. !lj i i , : \ ~ : + , .
'..4 ,
,.! s Advising l~ospit:~l
Il~:\li:lg(:~l~!l:~?~
t l i ! ;;I I ::!:i:~~r.it.;~
:ili~,!Il~~i~!..,
. .
o Conduct oCenquirii.:::,il~~l~~~~~:~i!~::iii'il!:.
;I.; t i i r . i . c . ; i . i r ' ;I;, 1.l1ci!l;l.rl;rgclncilt, i11 a
profession;~l,cl'lji:i(:~~~.
:!II(~ CO(i!itf~i!i~:l!
i!i;iili?r:.
Conduct of i~liti;ll,%)ra-,ilsc> , j l t l , ? :.,s?,:l ;.e2P4.4:>iic' . ?;e~cxwify'U'rainria~g,:IS relevant, for
all segments of tile I1ospi$:t$::&:t!?J..

Access cnntrol. issue iin(l i'c(:ol'ti..k!:,![iiu; (!I' idi:~llii!: t i o ~ ~ i l t l ~Ihr


l l lthe
~ einployees,
contraactand c;wu;~lSI:II'I';IIIL:
\~i:ciii)i'!:.

e Corltrol of movcmcnt 01' ~ \ . ~ ! , i c .i?.;~i't'ii: ~ ~ l ; \\rv i i l ~ i r !!ill: prcb~~.~iscs and in its immediate
vici~~ity,
f:~lliii);1111cIt:r l i ~ i i i l ; : t i ' 5 : x l i : ~ ' i ; : ~ \ (,,I ~ I I I II ) ! I ~ I c ! ~ ~ I I : I I I : I ~ ~ ; I I ~ c I ~ ~ .

e Reception ;md co11dut:l ill' ~ i t ; i i [ : i , . ,t!iti ;~i!(.:ili!:!~!!~..

e Assistance in ~nolaitorini:~
is~ngr$r.rtz> a n t ; ~ i i . t n rit!' L'iw :read Si~Tetyinstrtlctions and
nccidelit pre\rentic)l~.

o T
' o keep aware of ]'~otc:~iliiil
I.~IT~..:II.:.;
!.;i'i.!'i!):ii\;!l
: ~ ~ . i i ~ rll~.ou:gl~
j t ) ' , liaison with civil
police and olllcr ilpl~ri)pi.i;~tc
;~;!i:~ib'i\:~.

In sollrc hospitals, the ~ccur:! G.l,~~l i'111.1, tt: +'."l!l'tr.llo pcrtolnl soruc cltli~rnon- I
traditional 'scrvicc" l'unciron!, Lr!c I 111 v r l r , l , ti1 I - I \ ~ J iti8111 irssisl iIlid coortlinntc vcl~icle
pulcing, provide d4nati111c.et i , \ ' l i I l l ' 1 4 , I:\ i111it.ki 11 !1.11 1',.,1111'i11. S I L ] ) C I ' V ~ Smninten:l~lce
~
iuidupkeep of la~wn~ ;lilt1 I~t)~ti;-oii:~~i ( * I t,'l.ic~:. j~l~l)!~l,l
ti-) ~'01111.All tIlcse "peripher:lP7

functiom add vrlloe to tllc scv~rrit?j~~il~utioll%. IR:~~!LC~(~tllrr1~0spit31


;I'L'~~I employees and
visitors/p~tientsfeel good :a!bcbalt 'gcclal'il\'s ctic!j1~1':1fiion.ifow8evel; Y ~ I 1'C1111ctiolls ~
sl~ouldnot he :rl Llie ci)sL taf ]rrihan;irv n . c y ~ a ) e ~ - , : l ~ l p y y ul'.sk~eariiy,wl~irliis to s;lt'eplitrd
the liospital property :ii!d t h , ~~ P C O I I I Ciaktvk ~ ' b ~ ~ i i l ?t!lt.,l~4ll.
;

3.3.4e'konc1usion
A proilctive, prol'essional, acll-ta:~inctJx,2ci~l-lty tl,~pa~ln~c~it. whidl rocuses on criine -
prevention as well iIS public: survlcc c:i~!I I I ~ I LI ~~ I : J I I I ~(-~~lt~illtllioll
~ ~ . : I I I ~ to a hos1)il;l13s
mission.
-.---..----- --- --- -.- -,
3.4 SECURITY OEL&(;,4NISiYl1IB)W iiND PHYSICAL
SECURITY W/BIEASURl<S
----,-- -~ .,---

3.4.1 Security Organf~atia~n~


The overall orga~lisationoS a llosjj~t;~l nrol~lil\,;uy elcp~:ntlingon whctller it is a govenlinent,
private or cl~aritahleinstilution. No la;l11c.r wll;lL 1 1 1 s[~.uc.tz~rc.
~ thc mcc1ic;ll superintendent
(by whatever designillion I~clshemi~virc c;lll~~ll) is 1ror111;dlyrcsl)onsible, besides his other
functions, for ensurilly cllicicr~lh a 4 prcvcbfltIon;llitI ( 1 ~ g ; ~ 1 1 1 ~ iafthe
~ ~ i ( ) lsecurity
l i'utlctions.
It is important that the hecttrily's ro:n?rol is k ~ plrntler t :I single agency. Depending on
'
the size of the hospilal, Lllc mcd1c;11s ~ ~ j ~ c l m l c nwould
d c ~ ~ 11;ivc
t clirecily accountable to hi111
through llle head of scculity tl~l~ilrO~lcl~t,t~ co~nplc~ncnt ot sccurlty stalfcomprisii~ga mix
of;
b) Sccurily sul!crvisors *

c) Security guards - tlcl!:~stmcnti~I/conlrilci

3.4.2 The Staff Conaplenae~lt


'fie security stat'l' may be p r ~ p r i c i o l . y / d c l ~ : ~ i ~conrr;~ctcd
~ l ~ ~ ~ t i ~Lhrough
l, i u ~:~gcncyor 21
lllix of all. Weigllillg p ~ :~ud ~ tolls
s of c:~cllsystcl~l,:I ~ n i sol'depi~rl~~icn[:il iulcl roni.r;~cl
sccurily stat'l', 1'1111clio11il1g u~iderc.lcp;~rt~ncl~~;il sccuriry ol'liccr.:uld supc~.vist)iys~;lll'
provides all idtill l l l i x I 0 cllS~Wccllicicllcy allti lo itcl~ic\lcL;c.)sl-cllcclivcncss.

3.4.3 Physical Scctal-ity Mcas~an-es


I'hysical securlly nlc:wures ale ;I :.~l,rl clclncnr ol':uly Iio<pii;ll'ssccurity syc~cln.'Fllese
measurct.s shoallcl he pl;~nnc~tl in tlrptll, as a single I,i~rriersyhtenn fails to provide btott;il
secnrity'. 'Thcsc Inc;lcurcs, il muat bc ~llldcrslood,ci~uonly bc esl~crtcdL(Iilcr ;L';p11ys1c;ll
dele~rents,"to discouni:rc Lh<l~mdclcn~~ir~ctl :uld dcliiy Llic dclcr~~i~ncd"
a11il llcotl to bc
1):lcked u p by a scrics of otlrc1 c~onlr~hulor y III~:I~II~LS.

a) or tvalls lo dclitlc thc owr~crshipalicl to cli:u~nclize


Outer Protective Ring: I':c~~ci~ig
nlovcmcn t.

b) Middlc Protective Kiang: 1:xlcriors ol'tllc Puildinp, cci~ilprisc1l1crnicltllc ring.

c) Inner l'rotectivc King: Wirllil~(IIC Iiosllil:~I.;L111111lhcr of ~ ~ O L C C ~ri112s


~ V Cs l ~ o ~ ~ l t l b ~ :
cstilblislictl to sa1'cgui~n.lvul~~cr:~I>lc/sc:~isilivc:~rc:~s,
c.g. ph:u'~nacy,ol'liccs, mc(1ical
rccorcls. computer ~.oo~u/lclcpl~o~ic c~cl~iin,!jc,
c;uihicr'x locations, inlhnl S C G I I I I ~ ~ .
I;ur~~clry,kitchcn/storcs clc.

Physical Conlrr~ls
3.4.5 I~~aplcme~~tillg
I-Iospital adminisuolors arc oi'lcn rcluibt:mtI(] implc~ncnrsucl~pl1ysic;ll control th:~tthey
feel, may detr:llcl i i o n ~opcn all(] f'ricndly nrnlospl~crcol Ihc 11ospit:llor inhibit 1i.c~flow ol'
p:lticuts, visitors and sl:~l't'.'l'liis artitutlc I I : ~to bc h;llanccd with i1 jutlicitjus rl~ixoi'physical
conlrols to cnsurc c l i m i ~ ~ : ~ l i o n / ~ u i n i ~ ~ofi ilosses
~ : ~ l i o:uld
n to cni~blcllie 'p:~ticnl-clue' . ,
activities to prc>ccctlun-lii~~dcrcd. '8i':itlitioniilly, the :~dt~linistr:itors respontl to scc~~rity
pro1)lems by inereiising the security mall-power. 'rhis philosophy neecis to Il~ereviewed
in the liglit of ;tvailiihle ancB effective Security 'Ptcl~nnlogydevices, wl~icliare hecoaling
available indigenously in ;I cost-effective m;lnnel: 'i'his aspect well I)e el;il~oratedupon,
snbseqnently, as your study progresses.

The hospital m;ulilgcmcnt ant1 adllli11is1rator11111s~ c o ~ ~ ~ t i urcvietv


i ~ l y the Security
Organisation and its composilion, basctl on Llic cver chai~igingU~rcnts;uitl vulnerabilities.
Rlysical Secllrity Controls are o~llymic component of a hosp~ti~l's security System :uld
caxulnot be tlie sole meails 01' protection. 'They arc to bc co~nplcmcoledby correct policy
delineation, security procedures, stafling and opcriidonal control, remlbrcctl by secilrily
technology deviccs. It llas to l)e reeognixetl t11;rt sec~aritycontrols :Ire as ef'ficient as the
people who operate them.

3.5 ACCESS CONTROL GBNCEF'I'S

3.5.1 Defining Access Control


We need to ui~derstatldLhe col~ceplo f Access Control. SilnpIy put, Access Control is
n t people (including veliicles)". It means permission c,r
"Controlling the n ~ o v e ~ n eof
jafciy alltl Risk Rla~lagcrne~~t denial of entrauce to a give11premisesllocation or within a defined place against
unauthorized observation or removal and to prevent iniury Lo persons or danage to things.

3.5.2 Means and Components


The commoi~estAccess Control System is the mtlnui~lssystan, still 1k:lving allnost
universal application in India. In LIlc hospitals, chcclting pcoplc entering or leaving a
building is a form of Access Conuol. Essenti;~lcomponents of ;UI Access Colltrol System
<are:
Identification System for Staff: I-lospital inan;~gcmentshould make it inandatory for all
staff members to display identitication badges at all times, Lo allow Illein access lo the
premiseslspeciiied segments tllerein, u711ilr!on hospital pre~niseson duly. Fiilure to
display the identity badge, regardless of designation or seniority, will subject
individuals to being challenged arid reported for possible disciplinary action. An
identification badge sllould include the following dclails:
0 Logo of the hospital and serial number to prevent forgery.
e A pllotograph (preferably colour), placed in a ln;uliier, that it ciulnot be ieplaced,

e Nmie of llle individual, in bold type, which c2u1 be re;d at a istancc of three feet.
e Individual's job title :uld area of work (it11 clnployec Liolri laundry wopld need to
explain his presencc in 01' or pharin:~cy).
o Optional capability to be uscd in c;ud-access environmenls.

Teniporary Identification Badges: These sl16uld be user1 as a form of Access Control for
contractors, visitors md casual workers. Currcnlly, some teiilporary badges are designed
to "self-destruct", after lapse of the given time period, by bccoming discoloured or
revealiig the word "expired"
Card Access System: A c;u-d access system requires a plastic rectalgular fiud, which
needs to be passed llirough a wall-mounted reader. A variety of card techl~ologicsare in
use. Explanation of' each type, llowevcr, is beyond thc scope of this Icsso~~, Some systems,
which permil proximity identiiication, by the c;ud bcing hcld close to t l ~ e'reader', are
suitable for senior managanenl/doctors/sttII'f membcss. Tlie C ~ U sllould
~ S be safe-guarded
at all times,
Locks and Keys: As par1 of i~ hospital's access control systenl, locks rcstrict movement
of people into or within certain areas e.g. computer room, stores, phannacy etc. A
ce~itralized'key cabinet' at a control point, controls this systern. Masler-keys may be
provided to the Security Ofticer, to have access in case oi' emergency like tire etc.

3.5.3 Conclusion
Access control systcm must be h~stalkdin each hospital-taking into account, detailed
analysis of specific threats/vulnerabilities and requiremeills. The identification systenl
should he periodically reviewed and replaced to prevent forgeries.

Check Your Progress 3


1) Fill in Ule blanks:

a) The pllysical security measures should be plmiled in .............................., as a


single blvrier system fails to provide Total Security.
b) The identification system should be periodically ............................ and
replaced to prevent .............................

2) Natne (he three components of R perimeter protection syslein.


L ,, securlcy rnrents and vulnerabilities of a hospital is the sole
I-L~~G~~I~~GIIL.UI
responsibility of security oSlicer/manager. TrueFalse

3.6 INTEGRATION OF SECURITY TECHNOLOGY

3.6.1 Need foi Security 'Fechnology


Crime prevention system, based purely on huin;ul element, is not only expeinive in the
long run, its efficacy too to counter Ule current or potential t y p s of crimes, is restricted.
Equally, it is conlingent on quality ol' security man-power, their training and supervision,
which may no1 always be of the requisite standards. It is desirable, therefore, to augment
man-power based security org:lnisations, will1 security technology devices. Besides
making the total security mmagexnent plan more effeclivc, it inay xeducc tlie expenditure
in the long run,make security less obtrusive iu~d inay even assts! in monitoring aleruless
*of the security staff. What is needed is a halanced mix of technology nnd man-power.

3.6.2 Security Technology Plan


A Security Technology 1-71~ul
needs to be implemented for integration of securily
equipment, which would stcengtlicn thc inzmned security operations ruld would improve
quality of moniloring a~ndsupervision. 'l'he following lypes'of equip~nentshould be
considered:

a) CCTV for surveilla~ccaL selected locntic~iis.


b) Access Colitrol Equipmcnts.
c) Intrusion Detectioll Deviccs.

d) Guard Watch Equipment to nlonitor regularity ol' search patrols and alcrtncss of
guards.
e) Alarms.
f ) ,,.piugrnentationof Security I.,ighting along tlic perimeter ;u~dkey locations.
w

g) Security Coinmunic;~lionsin tlie form of dcdicatcd tele-coininut~icationslines and


walkie-talkie sets.
h) Metal and Explosives Detectors.
i) Metal Detector for screening of incoming mail,
3.6.3 Cornputer and Ir~formationSecurity
a) Key assignments on EDP Staff should be identified imd their verificiltio~lsystem be
instituted.
b) .Simultaneousupdates for all Common datd~~rogrammes.
c) Regular back-ups of dala andprogrammes. It should be duly indexed and catalogued.
d) Annual Mainterlance Contract (AMC) by co~itractualpersonnel should be carried out
under supervision of regular EDP stczlf.
e) Fonnal traking for new entrants and ~cgularrefresher programmesfor all users should
be institutionalized.

g) Allocation of computers for security operations.


h) Fonnal Computer Security Policy and Security Instructions should be implemented.

Check Your Progress 4

1) Security technology devices for hospitals are not cost-effective as they


are imported. TrueFalse
Safety and Risk Mnna&ement 2) Sc.curity ~ecllllulugyGI.viccs do d~~bstilu[e
110~ or cli~ninulc
security nlanl,o\liJcl.. TrucIFalsr

_C-.l--
3.7 SELECTION AND MANAGEMENT OF

----AND SECURITY TRAINING -


SECURITY AGENCY

3.7.1 System Claoice


Out of various 111odc\1'01 I>I clvih~on~np \cuurl[y nlanpowcr, I.c., dcl~i~rlnienlal 01 p~.oprictary,
con[rilctc(lor a lllix ol [llc ~ U J O1, 1 1Ilo~l,il<il
~ rnilnagcmcn[ nccdh 10 c\,itILILltc ad~;lll[:lge\:uld
disadvantages at cach p;~t[cl.r~. i:or o l > ~ ~ ~ l~l ci l:~, Ln I the
~ L ~nlnnngcmcnl
, and supervisory
elc~ncntah~louldhc fully de[>:111111e11tal, W I I C I ~ scci~rity
~I~ gu;~rijsni;~y'bca nlix i ~ i
dep;u~mc~ital and cantmctcd wc~1nt)1 51:ll'f.

3.7.2 Selection of Colatract Security Agency


Thc rollowing ;tspec[s rcqu~rcc:~rcfi~l consideratio11by lllc hnsl>ilal uclrni~ris[ration,while
selecting a contrncl sccul lly agcI1Cjl:

a) Short-listing ;~ndselect~onol' a n Agency should he done ~hrc~iigll13ix1rd ol'Officers,


prcl'erahly comprising 01' onc cxccutive each from Personnel &Administration,
Finance F ~ r and
c Si:curity Del1artnrenta ol' the Iiosp~tat.?'Ils Uo:lrd sliould put up llleir
rccornmendlltion showing Inter se gradations for approval of the Board of
Mnnagc~iient/T~vsti!t'sor Il~reclor(sf the li.)spit:tl (whosoever is Ihcht'innl npl>roving
authority) Followillg arc 111c~~cctln~mcnclcd .\lases in the sclcction of a contrael
agency:

a Sllorl-list~ngol' Agency.
Est:thl~shing Bid Spccil'ica[ion\.
e Visit to Site by l l ~ ch~ildcr.;(where rcqu~red).
Suh~nissionor' EiA.
e Fiual Sclcction 01' rile Agency.

b) Once the tenders have hecn ~.ccelvcd.these shoi~lclhe vetted by the Board of Officers.
Deliberations should bc rranyxlrenl. While selectilig the Agency, the B o a ~ ~sllould
d
keep in mind tl~etthc lowest rates may not ~~ccessnrily ensure quality of service. A
system of weiglitage in tlic proportion of 60:40 fur Professional or Teclii~icallnrlit
and 40%for comparative rstcs sllould be impleme~~ted, while consideri~lgtllr
man-power contract,

3.7.3 Verification of Securf ty Personnel


All security stafl', inclurling ex-servicclncn who have hccn relircd ti)r luore than one yea;,
shotild he duly vetled hy tllc Iiosl~i[almanagcnicn( ilnd vcr~l'icc!hy the civil policc
authorities, prior to crnploy~ncnl.R~otogral)Iisnncl liilgcr-l>rin~srecords of stoff of all
categories must be ~naintaillcd.
3.7.4 Security StaA $Qisci$l:rai,.: Sec

Maintaining a high degree ol'discii?liiri: ;illlllKlil:,{ > ; c ~ ~ i ! , i . si;;i'l'~:;


ii.~ ;b priority task for h e
hospital In;Ul~gelne~~t who shot~ldhtr i!il Iirc i t i t I!::-cii~i. r:oil~,!;~i1[1y Ii,r tlcreliction of duty or
i~lcoinpetence~ l n dd ~ 1with
1 it.s ~ v1.i1 ;;1 :i; ~.;r:i.i:;?;.,.:[,f
!I,! i'j,(, ii,iic>wii,;; lypes of iilst;mces
sllould invite quick action:

a) Absence without notioh.

b) Alcohc~lismu~d
d ~ ;1ti!.li~ii!11!!~!ci'i:iii11'i1~~t:
~ g

c) False reporting or t';liltr~-c:!o t'(:i:,rli~;:i!.l~:lii:..

d) Sleeping wllilc on tlilty.

e),
Un-necessary ll:u.itslir~~!ss/jijc
)lit i i ~
,.'.;:;\.i;.

f) . Wilful disol~rilie~~cc
of(-~l.tlct.:,.

3.7.5 Security T~*alia~iia~g

ii) On-Ule-Joh'l'r:lini~u: 1.5 1~11irs


iii) Refresher 'I'rainini! I O I~lws/:!working days/
4 l1;~lfdays once every six
-!
rnontl!~

iv) Security Aw:rrenkess lV~'a~);~:inia,~t~


j i ;rh~ I.!) Ilclurs
Nan-security B~:XCLC\U~~VL'P~
;rmi i..ii;;fi'
i'~i::~;abic:r:.;

b) Security Ir;riniag for ~ro~~-.st:ci~ril.y


s~u~i':illclt;lti I:c c~ilri~ic:i!crrII, i l l convenient hatches, for
about 10 11~st1ur;ltion. I~~il\~c'Sit:ii
Ic\:.:I ~r;rlili~il;! i";. 1lic I,:~IIIT:LcIc(J security staffslnould
be built in the co~i~;~c{.u;il1)r1,~.i;b;io1ir-; i:rls~~ri:,lprior to dctailinent of - '
r i i ~ i la.;i::i:i.l;t!.iT:<
securily guartls 011 llill y,

3.7.6 Conclusiori
Jn bccurity I I I . ~ I ~ ~ I Inrrli!d
tlle foreseeable futul~-e ~ ~ ~ I :ciilltll\til'
I 11) l)rk t l prllntry
~ basis for
hcurity orgmrisation iin 11ospit;rlsill I ; ! . i I ,: 1 1 ~ , p'7 .I( 1'.1. i ii~!i.~:inrr Ih;u tl~esecurity staff is ,
nppointed/sclected, kecpilig iir view rl;c ill i I~:#;I!IIC:!I~OI~ :;II.I~CIIIIC,environment and
tnissiol~of a hospilnl.
---.--,.- "-" - -" ..,.-.-.".--- .--
3.8 SECURITY AND ---.I--,hkll ,-..--.---".--.--.
3.8.1 Introduction
Tlie hospital sccurity stal'f, hy tlic I ~ ; ~ I I I S(11V (l~cir sic )I!,, i ~ t v to
c ilitcri~cldaily with large
number of people. Most of rlicx inii'ri~i~tio~~h :,rrl r*nrtli:~l.k'luwcvcicr, sollie of Uicse
exchanges inay [urn out to bc strcssfi~l nil ~.Y~:IIilc~111c. 'I'PIc. security officers and their
staff mny coilfront suspicions trcsp~rhsc~rh, a~a~ln:rg)gay f:ln~IPynaenlhers of patients,
illtoxicatecl visitors, at timer vio!r!nt or a~it.s~ail:~lPy isrdl~:atlin~~ced palients and angry
employeesloatsidcrs or crimilmal.; sar.sjrr.a-tuxrl fd thrE'I 1Blrg:hl rrse of drugs, In hmdling
such atses, tlie scclirity statl't~ntlin turn tllca hospitill ;idmir~istr;~lcrs, will face some very

. -- - -- -
Snfcty, nncl Risk Mnnngen~el~t difficult decisions, having to decide witl~iiiseconds, wlielllcr to detain, use force, searcll,
interrogate or initiate prosecutioli of posslble offenders. At times, they must also decide
whether to tell other pirtics about such inkidents. Each of sucli sit~~ations has legal
implications. Violation of legal provisiol~smay not only place the sec~rritystaff in the
wrong but the institution too, being the principal elnploye~;nlny become liable for tile
acts of violation of the law. It is, therefore, necessary Ulat you, as tlic 1iospil;ll
administrators, as tllso the security staff, should be well-i~iii~rlned
on provisions of law
regarding the more common legal risks, botli civll iuld crtrninal, which hospital sccurity
staff may have to face, in daily discharge of their functions.

3.8.2 Some Basic Provisions of the Indian Penal Code (IPC) -


Concerning Security
While this lesson, for obvious reasoris, cau~iiotbe all-encolnpassing, soinc of Ihe basic
provisio~~sof the IPC, having an impact on dischiugc of security fu~ictionsarc outlined
below. In all cases, however, wllen in doubt, thc security staff must coilsult witll the
hospital administration, who should act untlcr advise of lhe legal counsel. II should be
realized that the Industrial Security staff, :is ol'now, ill our collntry, derive their authority, to
act from provisiol~sin the IPC reg;uding Right ol'I3rivate Deltnce.

e Riglit of Private Defence: ( P C Sct:tion 96 & 97): "Nothing is :ui oi'feilce, which is
done in the exercise of private defence." 'l'hcre are soine restrictions in Section 99.
Every person has a right to clefend:
- Rrslly, his own body auld the hody of iuiy other person, against any ol'li:ncc
against Uie human body,
- Secondly, the property, whether moveable or iminovi~hleof l~ilnselfor of any
other person against au~act, which is au~offence falling undcr the definition of
theft, robbery, mischief or crimintll trespass.
e Tlieft (IPC Section 378): A theft is always committed in relation lo moveable
property.
e Pilferage: Is reinoval of small ilems due to temptation ol' daily needs like pencils,
pens, coolted food, etc.
i
e Robbery (Section 390): ~ d b b e isr ~m aggravated foi~nof Ulefl. 'r11c rnost importanl
eleinent ofrobbery is the prcsence of imminent force or xliolencc.
e Dacoity (Section 391): Wlien live or Inore persons joilitly commit a robhcry, it will
amount to dacoity.
e Mischief (Section 425):Whoever causes or intends to cause or knows Illat he 1s
likely to cause'loss or darnage to U I security
~ of Ihc property, colnmits on offence of
mischief.
e Criminal Trespass (Section 441): bV11ocver enters illto the property of a~iotllerwPth
an intention to commit tlie offence or to intimidate, to insult or to annoy the owner
of that property, commits the offence of criminal trespass, l;urtlier, whoever has
' Iawfully entered illto the property of another suitL milawfully relilains thcrc with rui
intention to i n t i d a t e , insult or annoy the owner of the property, coininits the
offence of criminal trespass,

3.zh.3 Authority to Arrest, Use Force, Conduct Searches, Frisk, Inspect,


Interrogate and Interview
l11e illdustrial security ollicials in our counlry, do not enjoy tl~eaulhority normally
vestod br h e civil police authorities,l'hey may detain, tclnporarily (till earliest huiding
ovcr To d ~ civil
e police), io Ule execution of right of selihlefe~lce.l'lie autllority to
conduct searclies, frisking or inspections, even on the p~qenlises,must be wit11 specific
authorization of.&&. llospital administration, who too mwt stipl~latesuch possibilities
in the co~lditio~ls
oi'service of their enlployees.
3.8.4 Reporting Procedure
All major incidents, ~~ccidcnts, tl1cl'~sand ol'fcnccs S I I I I L I I ~ ~ior~lially
be reported to 11iccivil
police in the I.orrn ol'a First Ini'ormation Report (FIR). ~ o k e v e rinvariably, prior
perlnission of tlle hospital ~managcmentmust be obtained by the secnrity.staff or
departmental heads beforc ally report is lodged with tllc civil police. Tlie FIR.
clepending on the siluation, 1i1~1y he or:~l(on telephone) 01.wriltc~~; the impol.tanl points arc
tl~alit ~iil~st
he lodged wilhout any ~~nexplaincrhlc dcl:ty all? wiili as mudh rclcvanl
inl'ormotion as 1s avniluhle.

Sec~~rity f'~lnctio11in a hospital, is sensitive, cl~s?llc~igi~ig


a11l.l:I rcspo~~sible
tusk. The liosl~ital
-
administrators a ~ l d~llcsecurity staff musl be' thoroapl~lyconvcl.snnl wit11 their rigl11.sand
limitations, when enl'orcing v:irious dircctio~is,in order 10 rlvoirl tlie risk of violating 1:lws (11'
t!ie lantl.

Check Your Progress 5

1) Tlie u~i,juslil'ieduse c ~ fI'orcc, or excessive i'c~rce.by :I security all'iccr,


nay result in a law suit or criminal prosecution. T~nc/l~olsc

2) Sccu~;rlyol'l'icers niny conduct c~'rtni11SC;IICIIC~ ( > ~ ~ t \~~IrIlCeI~~I~. C I I I I S C STr11cFii1sc


.

3) Violalion 01' any 01' llic 1cg:ll ~~rovisions by security s ~ ~ lnlny


' l ' render tile
liospilal. as an instil,ulion, liahle for :icls ol' violutio~~
ol' tllc law. True/Falsc
. . . .

4) The Iy~spital~ L ' C L I ~ ~~1~111'


L Y 1lle111bel.h
en.lr)y p o w c ~of~tllc c~vilpolice,
while Suncticlning within liospilnl premises. Tr~~c/Falsc

5) First Inl'ormi~tionIXcport (FIR) ta the civil policc c;u~he lodged cinly


by n. legal person. Truc/l;ulsc

b) Pillirrngc : ..............................................................................................................

c) Rohhcry: .............................................................................................................
d) D:icoity : ...............................................................................................................
-.

3.9 STRATE~IC SECURITY PLA~"~J AND STANDING


SECURITY POLICIES AND PROCEDURES

Secuiity lapses occur in Iiospitals, primarily rluc to one o r 11101.~01' llle following J'aclors:
0 Absence 01-inclderluacy of well-analyzed scc~~rity ~olicies,di~*ectivcsand guidcli~les
by tlie hospital miuiugc~nentfor tlie security depar~mehtand c~tlierstaff.
8 Inadequate involvc~ncn~ of hospital's top management i n securily organisation, in
updiiting of security ordc~sand
threat assessment, monitoring, rcview alltl p~l.i~ilic
instsi~ctions.

~ L Y and lack ol':~ppropri:~tctraining ~ I Iscc~~rity


Faulty sclcction of' ~ C ' C L I ~ s1afS '
personnel and ollier staff,

Virtual abscncc ol' integrated security technology tleviccs.

intHospitals
3.9.2 Effective Security ~ a n a ~ e r n e n
Some 01' the important co~~nter-rnens~I~.cs managernen1 in
for cnsul-ing cl'l'icicnl sec~~l.ity
liospitals are as ~ ~ n d c r :
I Preparation of Str;ltegic Security Pltui, based on a professional Securily Audit. This
1 Slfety ant1 Rjsk h l u n a g e ~ ~ ~ a ~ t o
, should be carried out under directioils ol' tlic lop ma1:lgcrnenl :uld must have their
continuous involvanent.

'4 e Stipulation of security policies, procedures and standing orders :hd instructions for
security department and ofl~er non-security staff.
'I
e Effective screening of all employees, especially security stafl' iuld colllract security
agencies.
I e InitiallOn-the-jobAlefres1ler trwling lor all security arld ilon-security start in Loss
I
I Prevention.
o Effective orgalisation of skcurity operations, based on 'site' 2uld 'post' instructions
;uld system of regular supervisioll.
e Immediate incidellt reportinglresponse.
i o Mutual Aid Plan and efi'cctive liaisoll with civil police uld olllcr :~gencies.
I

e Contingency Plans for secority-related CrisislDisastcr Mamageincnt.


I
0 Periodic review and updating of secl~rityplans, instructio!ls and procedures.

3.9.3 Central Security Control Room


A Central Security Coilwol Room (CSCR) should \)c eslahlished to execute thc following
asks:

a) Act as Lhe Security Ofticice.

b) Be fully equipped to detect explosives, lire iu'lns and cnnducl clcclronic :~ndpllysical
searches.

c) Monitor perfonntulce of the Sccurity Still'f.

d) oni it or hisecurity of ~itall~ensitivc


arcas witl~iilthe inslallatioil.

e) Be able to co~nmunicatein case of urgency, i1nmedi;ucly will1 tllc Mcdical


Superintendent and Chief Securitj Officer even al'ter 0fli.c~
1 Iours and Security Posts
and Mobile 13atroIsa1 all times.

f) Carry out verification, hold records, issue passes [or all sections ol'e~nl)loyccs,
coiltracted staff and visitors.

g) Generate MIS reports for the Management 011 Security aspecls.

11) Keep computer based records of i~icomingand outgoing Inovclnellt including


personnel, vehicles ald m;lterials.

3.9.4 Patrols and Post Procedures/Technhpes


Eflective pauolling is tlle hack-bone of ariy good security and sill'ety programme. It affords
opportuility lo mollitor the entire environmalt, prevent problems l'ro~rloccurring, by
instituting timely remedial measures md gener:lting a fecliilg of 'Security' on the part of
staf!; patients aud visitors illike. Patrols GUI be on foot n no st common typc) or a vchicle
patrol (including bicycle or moped), 'conspicuous', 'inconspicuous' or selective
(concenuatingon high-risklsensitivc arcas).

3.9.5 Control of VisitorsIOPD PatientsIAttendsnts


a) Well-for~nulatedand comprehensive guitlelines :mtl instnictions h r thc visitors necd
to be created to reduce congestion, .

b) While anxiety factor of the relatives/wclJ-wishcrs ;uld 111c so-callctl, "1ndi:ui Culture"
of displaying 'visible' sympathy cau be appreciated, thesc must he hala~lcedagainst
the totality of enhanced Security threat, ildministrativc problems of accomtnodating
larger number aud h e risk of greater infection.
Snfety elid Rlsk M a n a g e n ~ e ~ ~ t
3.10 SECURITY-RELATED CRISIS/DISASTER
MANAGEMENT IN HOSPITALS

3.10.1 , Introduction
At no time has crisis/disaster management been more critical to the literal survival of
hospitals and health-cqe facilities. The hostage Lalcing of 500 persons, in the year ealy
2000, in a large hospital in Thailand, by 10 terrorists belonging to a Mynnamar-based so
called "God's Army" is a11 example of the unforeseeable1ci11dof threats. In times of crisis/
disaster, everyone turns to "Security", who may be ineffective, in the absence of a well-
t l ~ o u g lout,
~ t rehearsed and practised disaster-management plan. Traftic control,
prevention of crowds and theft, commnunications, assistance to police and tire crews and
handling of press and VIP visitors become critical responsibilities for security staff durink
emergencies.

3.10.2 Types of Disasters


Basically, there are two broad categories of concern to a security organisation-external ,

or internal. Major disasters can be:

a) External Disasters: Influx of lnultiple casualties at short notice due to:


e Rail/Road/Air accidents
@ Radiation release (like Bhopi11gas tragedy)
e Earthquakes (like Latur, Joshimath)
e Severe weather kloods or cyclones (Orissa, Andhra Pradesh)
e Civil disturbanceslterrorist/militancy situations
Q Structural failures
e Fire
e Hot war or war like situations
f

b) Internal Disasters: These relate to co~lditioi~s,


within the hospital, which disrupt
ilormal operations. These may be:

Fire incidents
Radiation release or cllemical spill
e 'Hostage-taking or violeiit situation
e Power/water/sewerage disruption
e Staff strikes orpalientslvisitors agitations

3.10.3 Preparing for a Disaster


The hospital management needs lo formulate a comprel~ensivedisaster response plan,
establishment of a control centre and assignilig specific responsibilities, in order to deal
with the emergency, ensuriilg that the health-care aspects continue with as little disruption
as possible. It is beyond the scope of the brief lesson to go into any greater details of
disaster ~nanageine~~t aspects of hospitals.

3.10.4 Bomb Threat/Response


Bomb threats are becoming a reality for hospitals LOO. Whether bomb incident involves a
hoax threat or a threat that leads to discovery of a bomb or a detonation without warning,
proper planning and training will ensure that your hospital is ready to react when an
incideiit occurs. One of the many challenges that face, the decision-makers is the
guessing game. Is the threat*ahoax or real? Do we commence hospital-wide search? Do I
we evacuate the hospital? Fully or partially'? The olg:~nisational plan for dealing with :curity I Organis
andI Manage
bombs and bomb-threats will ensure laying down g~~idclines for dealing with the
situation, bascd on available infonnation. It must be reallxed that in our urban
conglomerates, the police bomb detection aud defusion scluads, may take quite some time
to reach. A hospital's 'Bomb-Threatyplan sllould cater f6r creating a protective
system without creating panic, till the specialist bomb squads get activated.

3.10.5 Conclusion
The foregoing points provide o~ilya basic outline of functions, that flie hospital security
organisaiio!~may be I-equired to perform to pro-actively prepare for crisis/disaster
situations'. A delailed plan needs to be prepared, disseminated, rehearsed a~ulkept
~~pdi~led.

Check Your Progress 6

I) Hospitals. heing vilal to the community, can totally depend for security,
on police and lire scrvices. TrucIFalse

2) During an cmergcncy, penplc will recognize the securily unifo1.1n and


obey all inscruclions. TrueIFalse

3) Most bomb-threats are liuaxes and need to be ignored. TrueIFalse

4) Rcspoosibilily l'or the overall tl~leatassesslnenl and for Ihroiulation ol' strategic
security management plan in a hospi~alis of:
A) Hospital's Top Management

OR
B) Chief Security Manager
5) List seven iniportanl counter-measures for ensuring cSSicicnt Loss-Prevention and
Securily Management in liospitals

3.11 GOALS AND OBJECTIVES OF SECURITY


MANAGEMENT

3.11.1 Goals
The goal of llospital security department is to "provide security services to all those
who are interacting within the l~ospitalpremises and to ensure protection of hospital
property, through rlse of well-traiaed pcrsonnel, technology, prevention activities and
timcly response to cnlergencies and requests." It involves treating people equally and
with total care and respect, r-egnrdlcss oftheir gender, religinn. age, handicap or any other
Ihctor which may put tllcm i n a minority category.
Safety and Risk Ma~lagai~cat 3.1 1.2 O b j e c t i ~ e ~

e Prep:u;ltioo of strategic sccnrily plail. b:~sccI01.1 I.l~rcat:!nil v~.~lncc.;~ilili(ies


n~li!lysis,
:md formul;~tio~~ of security st:utding i~~slt~~ctic.n\s,
I
,! e Mollitorins i~nl)lcmcnlalio~i 01' tllc securily iq>'l.:~ticlr~;lld c p l ~ ~ y ~plan,
~ ~ e through
a~t
i \ well-selec:ccl and 1r:iincd security sl.~I'f/cnnll.;lc:Lciisecui.ily iLgcncy.
!I r Guicle sccurily dcp;nllnc~itto pro-c~clivelycontril)o(c ill a ~ : l ~ i e \ ' c nof~ eyour
~~t
hospital's mission (-11' provicling llie hcsL Ucullucnt. ;ilatl pw!icnl-cilre. ;~ll:~nlingpeople
to 1i;lve peace ol'mit~d,while intcs:~ciingin I.lltr hosl)it;rl [;rrriliscx.

3.11.3 Conclusion
~ thcSts/losscs pcr y c u by rllclr
11' the hosp~tal'sacc'uliry tIel,:lrt~nc~lLctui deLct.[ or c ; ~ l c l100
efforts, even at only Rs. 1000 per ~ncl~lcul. llazy \7.~oulrJI l ' n ~s:~vc~tl
~ 111~tloapltal Rs.
100,000. If t h e security org:lni.;;~tioaitlualtitics secu1rity :na~tB s:ih'a~tvIaazilrds I~efore
incidents or prevents :rssalslts; it can significthlntly reduce tlme s~a;ltcri:rllosses ;rnd
damage to the hospital's image. Tlae is890~e(Doeh ~lliuftake illto :BCCC)LIII~,4ecairity's
efforts to help dislrinisli tine p;riaa, sts81Pr-inag ;la118 ilacoalvea~ieiaccBY) I > : I $ ~ P B P ~visitors
S, ai~d
hospital staff? ttherel~yco~~trihoiinlg to I~o.sgaild'sovcr;ell srai.s:;ho~a and its innage in
the pnhlic.
- -

3.12 C E -.--
T US SUM UP
-.--------- ----..- ---." -

In this unit, yon 11:lvc learnt the I):rsic es:;c!nltialsof' the rnSc of lat~spit:d:~drninistnbtors
in planning, organisittion, review a~icldiirectioln o f sccority nr1~1ainlistr;ltionin hospitals
in India - wlletller i1-npublic, priv:lte o r governr~nentsectnrs, You h:we lcrlri~t. of the
prevailing security threals and vu1ner;~bilitiesot' hospitals :uld linv,? to effcctivcly :uld pro-
actively counter these by implementing physical securil y u!easures, ilcccss control
concepts, integr;~lionof security technology dciccs, sclacrio~~ il~ldI I . L ; I I ~ ; I ~ ~ofJ Isecurit,y
I~~~~
organisation imd security uaining. Clllr~enlly,in most os);;uiis;llions, sccurity is considered
by the hospital ailministc;~torsas a peripheral tat~clion,rcleg:lletl to pcrlhrnlal~ceby tlic
subordinate security slaff: willlout ;my direction or. g~iidclilics.Ell'c!clivr o r
Comprellensive Secr~rityielvolves all execafives a1mt3 depisrtlllrlsts :rlacll 11ot n ~ ~ r e the ly
security staff. I-Io~efully,at :he cc~nclusionof [his nit, yo1111;1vcrc~~lixcd (hat hospitals in
Iudia are'no Ioliger. sllelLcred or scclr~dudlrcwn t.11~strifes ;ulcl im.iclics, f~~c'ing Ihe rest of
the society. Thc hc~~piti~ls too IIIIVC to l'ilcc up to the growing cllallc'n~~es i u ~ dsophistic;itio~~
of die criminals. "A proactive, professiraamal amrd ~vc?ll-tx.ain~ecP s e c ~ ~ r i del~srtment,
ty
which focuses on crime preventionn as \v).c~l1:is I I A I I ~ ) J ~ C !service will ralirke significant
contril>utionto your I~ospital'snnissiorn :and f~umction;rs ;in integrirl, well-respected
and essential p a r t of your bigger orgnrlisi~tiosn.

3.1,3 ANSWERS TO CHEC16


- --- ---- -PROGRESS
IrO'I(!R
Clreck Your Progress 1
1) last, last
2) policy ii'amcwork, loss-grevention.

Check Y o i ~ Progress
r 2

2) False

3) Tm
4) a) Negligence

. b) Lack 01' trai~ling


C) Slieer malice Sec:ority Orgal
and Mnna
d) Extcrnal or natural causes.

5) a) Pharmacy

b) Casli i~andlingareas.

c) Colllp~ltcrccI1tl.c.

d) 'InLant and pediatric units.


e) Parking areas.

Check Yonl- Progress 3


1) a) depth

6) reviewed, fo~gerics

2) a) Outer. ~>rotectivering.

h) Midclle protective ring

C) Inner p~.otcclivcring

3) Fnlst;

Check Your Progress 4


1) False

2) Truc

3) a) CCTV for \u~.vcilliuicc.

h) Access Contl-ol E~luil,~nc~il.

c) Intrus~on[)ctcction I.)cv~ccs

cl) Alarms

Check Your Progress S


1) Truc

2) Falsc

3) True

4) Falsk

5 ) Falsc
6) a) Theft: A theft is always coii~~nittccl
111 rclation to a moveable p~.opcrty.

b) Pilferage: Pilferage is rcmoval of small ilerns due to temptation of daily needs.

C) Robbcry: Robbery is an agglxvated f r > r n ~ol' Illeft; tlie mosl important clement
of robbery is tbc presence of' imminent force or violence.

d) Dacoity: When f'ivc or morc persolis jointly commi~a robbery, it amounts to


ducoi ty.

Check Your Progress 6


1) Falsc

2) False
4) A) Hos[>itallaTop Mallaiylncn~

5) a) clircclions 01' hosl>it:~l's'li)p


Prcllar*:~tionoi'Str;ttcg~cSec-.utity Plan. ~1ndc1
Mani~gcment.
0

b) Sl~pulationof securlly oolicics, prc>c~clurcsa~iclstanding orJers/instructions on


Loss-Prevention anil security for secu~itydepa~lmcnlancl other non-security
slalf'.

C) El'l'cclive scrcenlng of LLII cmployccs, especially st.c~n'itySL;I~'J'


: ~ ~ i ~(111tril~I
il
sccul-~tyagenclcs.
FIRE HAZARDS

4.0 Ohjeclivcs
4.1 Introduclion
4.2 Blemenls of Fire
4.3 Fire 1-hwiti' l'r~;uiglc
4.4 Callses of I-Inspilal l3rc
4.5 Fire Progsessica~('i~rve :md Slnoltc Danger
4.6 Classilici~Lioliof Iiircq
4.7 Firc Protcci~on
4.8 Structure Plan~~ing
:uld 1.IcsignConsideration
4.8.1 13uilcli11gs: Il;true$s Communication Zone
4.8.2 Building Se~vices
4.H.3 C.;e1ik:11 Air-(?o~iiIilio~ii~~g Fi~ciIii.ii!s
4.8.21 Electric Tnstallatio 11
4.8.5 Spccii~lI-lazi~rcls
4.8.6 I3xed 111st:dlnlion
4..8.7 I-I:~zal.tlsA ssc~ci;ltcclwit11 l:u~~~iisliing Marcri:~l, Curkli~ls1Jpholstery, Dresses, Bed arid
Rctltling Mi~teri:~ls
4.8.8 LValcr S u p l ~ l y
4.9 Fire PoiriLs iuld 1Bc:lpc lioulcs
4.9.1 ]:us1 Store
4.9.2 I ~ I ~ l'oi~its
~ , I : I I I LC7iill
4.9.3 Mcallr o r Ii5c:lpe
4.10 Kislc Eva1u:ltion
4.11 I,cl Us Sun1 IJp
4.12 Sclf Asscssmont Activity
4.13 Ariswers LO Cl~eckYonr Progrcss

Appendices

Altcr studying this uliit, you shill1 he tlhlc Lo:


e ilssess the magnltudc (11' the prohlcln of I-Iospiliil Arc 1iaz:lrds;
s enumerate the I,asic pr.inciplcs oS I Iospilal planning cons1i1cr;ltion in relation to lire
emergency plau~;
e dcscribc Lhe c;nlscs iuld source of hospicil lirc ant1 \~;lrioustypes of' lire Lighting
dcvioes auld equ~pnle~it; arid

r plmuling tlrld tlcsign considcr;itioo for fire detection systems


explain various swuc~~lrc
iuld Lire prcc;ultion.
-.
4.1 INTRODUCTION

1;irc i&,,~~oLcntii~l
4,
hazard in 211 hospirnl prcmiscs. 111 this unil, you will learn

You might also like