{"title":"Should you outsource your hospital's security services? Some things to consider.","authors":"David V DiNapoli","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>The author, who has managed both in-house and contracted security services, states unequivocally that hospitals can save money by hiring a security company, but cautions that there may be other considerations involved. In this article he provides guidance on making valid and meaningful comparisons between the two options.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"46-54"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accident investigation for the security professional.","authors":"William R Losefsky, Jeffrey M Putnam","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>One of the additional services that Security provides in the healthcare setting, should be accurate and thorough accident investigations. These can be critical in protecting your facility's interests, the authors point out. In this article, they describe in detail the accident investigation skills which are required of frontline security officers.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"61-6"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical security, HIPPA, and the HHS wall of shame.","authors":"April Sage","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>In this article, the author a healthcare IT expert, reveals what experts have discovered in analyzing HIPPA data breaches. Most are the result of theft or loss. She explains why this is so, and offers a solution--improved physical security.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"85-90"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The 2014 IHSSF crime survey.","authors":"Karim H Vellani","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"28-35"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tools for an effective annual review of the Security Management Plan.","authors":"Matthew Daniel","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>A hospital's Security Management Plan, required by the Joint Commission, can also be used by security management professionals, the author points out, to ensure that they are continually monitoring and improving the program in a changing healthcare environment.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"105-8"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building a metrics program that matters.","authors":"George Campbell, Marleah Blades","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Whether management wants it or not, as the security experts, it's our job to measure how we manage risk and inform management on our status, the authors say. In this article, they provide five steps to building a responsive security metrics program.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"116-24"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evidence collection and storage policies.","authors":"Julie Schenck","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"88-91"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visiting nurse service and home healthcare visitation safety.","authors":"Dan Beaver","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"107-16"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TASERS in healthcare: myths and merits.","authors":"Brian T Bastianelli","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>The author, who has trained thousands of police and civilians in use-of-force, tackles the controversy over the use of CEW technology (TASERS) in healthcare settings. In this article he provides the latest technical developments for such weapons, dispels three common myths about them, and provides fresh perspective for further discussion and consideration of their use in healthcare security.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"30-4"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HIPPA compliance for vendors and suppliers.","authors":"John M White","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Between 30 to 45% of breaches in Protected Health Information (PHI) involve vendors, yet in most cases it is the hospital that is held liable for the breach. In this article, the author explores the practice of relying on vendors to conduct their own background checks of employees they assign to hospitals. He provides guidance on how hospitals can insure that such checks are up to the standards of the hospital's own background procedures without taking over that responsibility from vendors.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"91-7"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}