An Inside Look at Hospital Security

Author: Carlton Purvis, Published on Nov 18, 2013

Security in hospitals is critical and they spend lots of money on security systems and services (e.g., third largest industry employing security guards). How hospital security works and what issues they face are key concerns.

In this interview with Margarita Castillo CPP, who retired after 24 years at University of New Mexico Hospitals as Manager Security Operations and Security team member, she explains why hospitals are different from traditional security settings, how officers coordinate with medical staff and what technologies worked and didn’t.

Why * ******** ** ********* **** *** ***** ********“The most unique thing is the fact that, as security, we’re dealing with patients and people with all types of medical issues, sometimes life-threatening heath issues. That very fact delays our ability to move them (patients) immediately should an emergency situation occur that threatens the hospital at large," she said.

***** ***** ******** ********, *** ******** *** ******** ** ******** and *** ********* *** * **** *********. ******* ** ***** concerns, *** ** *** ******* ******** *************** ** **** *** the ******* ** ******** *** ****** *** ******** ****** ******* remotely **** *** ******** ******. “*** **** ***** ****** ***** sound ** *** ******** ****** *** ** **** *** ********** would ******* *** *****, ******-********** **** *** *** ***** ***** ****** *** ****," *** said. *** ******** **** ***** ******* ** *** ***** *** maintain *********, ****** ****** **** ***** ****** ** ****, ******** and ********* **** ***** ******* * ****.

Why *** ********* **** ** * *********** ********* **** ** *** ***** ** *** ******** **** the ******* ***** ** ********. ****** *** ********** ****** ** or *** ** *** ********* **** ****. *** ******* ** medical ****** ***** **** * ****** **** ** * ******* life-threatening ********* **** ******** ********* ****** * ******* ******** ** other ********* ********. ******* ****** ******* *** ***** ***** ** the ** ***** **** **** ** *****, *********** ******. “** a ******, ******* *** **** ** ***** ***** ***** *** to *** ********* ****** ** *** ******’* *********," *** ****. There *** ****** ** ***** *** ******** ******* ******** ** ****** the ** *** ******* ** *** **** *****.

***** *** ********* * ****** ******** *** ****** ******* ************* **,*** ******** ******* ***** ********* room ********.  “** ****’* **** *** ******* ** ****, ** was **** * ******* ******** ****** *** ****** ** *** day,” *** ****. 

Worst ******** ********** *** *** *** **** *** **** *********

******** **** **** ** *** **** ** ****, *** ***** attempt ** ****** ******* **** ****** *** **** ****’*, **** the ******** ********** *********** *** *** ** ******** ** ******** ID ******. *** ******** ** ***** *** ******** ** *** hospital ********* *** ****** **** **** ***** *********** ** ****** the **** ***** ***** ** *** ********** *********** ******** ** areas **** ** *** “***” *****. ******* **** ** * teaching ********, **** ** *** ******* ******** ** ********* **** assigned ******** *********** **** ******* **** ** ****** *** **** of *** ******** ********** ** ***** ********. ******* ******** ** residents **** ******* **** ******* *** ******* **** ******* **** allowed **** ********** ** ****** ***** ******** ** **** ******. The ******** **** ******** ******** *** ******** *** ******** **** the ******* ** ******** *** *** ****** ***** ******* ******. “We ******* ******** *** ******* **** * *** **** ** make ** ****** ** **** *** *******,” *** ****.

** *** *** ****’*, *** ******** *** ************* *** ******** readers *** * ***** ** ****** ***. *** ******** ********** included *** ***** ***** ******* ********** *** ******** *** ******* 750 ******** *******. ********* *** ********* ******** ******* ****** ***** 1000.

*** **** *** ********** **** *** *** **** **** *** most ********* ** *** ******* *** ******** ******** ** ****** the *** ** ** **** ** ****** ***** ** ****** to **** ********** ******** *******. “*** ******* ** ***** ** area *** ** *** *** ******* **** ***** ** ******* over ***** ******** ****** *********** ** *** ******** ******* **** regard ** *** ** *** ******. * ***** **** ** something ** ***** *** ** *** *** ** **********. *** example, ** *** *** ******** ** *** ****** ****** ****** and ***** *** ****** ** *** ******* ****, * ******** positioned ******** ****** *** * ******** ******* ***** **** * tool **** ****** ***/*** ** ****** ******* **** ***** ******* a ******** *** ** *** ******* **** ** **********. * think ** ** ***** ** **** * **** **** *** security *****.  **’* *** *****, *** **’* *** ** *** level ** ***** ** **,” *** ****. ******** **** ** should **** **** ***** *********** ** **** ********** ***** ********** where *** ***’* ** **** ** * ****** ** ***** aggressive ** **** ******* **** ***** *****.

Security ******* ********Security officers were cross-trained to perform a variety of duties as required by the assigned location. Permanent location assignment often lead to complacency so security officers now rotate through locations and must learn the different tasks associated with that specific location, such as the Emergency Room or the Mental Health Center. This included patrols of the assigned facility, dispatch duties, access control, monitoring and operation of the video surveillance system. For patrols, they were trained not only to identify possible security threats, but to also challenge or question people who appeared to be lost or out of place, including people who might be off their medications. The training they received for this purpose was called “Crisis Intervention Training."

“**** ****** ******** ** *** ******* ***** ** **********, **** present **** * ******* *** ** **** ** ***** **** to ***** **** ** ***** ********,” *** ****. *** ******** officers **** ******* ** ********* ********* ********** ** ****** ****** issues ** ****** ** ** *****. **** **** ** ******** is *** ****** ***** *** **** ******** ** ****** ***********.

******** **** *** ******* ****** ********** ********* *** “****** ************ ******** (***)” ** **** *** ****** ******** ** ***** **** *** to **** **** ****** ****** ****** **** ** ******** ******, or *****  ****** ****** ******, *** ** ********* ****** *** their ********** *** **** *** ********** ** ****** ****** ********.

*** *** ******** *** ******* ** *** *********** ****** ********** and ******* * ************ ******** *** ******** ** *** *** ****** ****** ****** to *** ****** ********. *** **** ******** ********** ******** *** training ******* **** **** ** ***** ** ** ***** *** their ************. *** **** ******** ********** ***** ***** ******** *** *** topics ** *** ****** ****** ********* **** **** ** *** Emergency **** **********.

***** ******** *** ** ****, * ******* ***** ******** ***** to **** ******** ********. *** ** *** ******** **** **** hospital *********, ******* ** ********, ******** ******** **** **** *** ******* *** security ** * ******* *****. ****** *** ******, *** ****** of ******** ***** **** **** ** ******** ** **. **** did *** ******* *** ******** ** ******* ********* ********** *** was ****** **** *** ***** ************ *** ****** ******* *******, or *** ********* *** ****** *******.

Challenging ** * ******** *******

“***** ** ******, ******** ******** *** ********** *********, **** *** pick * ****** *** **** ***** ***** ********* *** ***** that ****** *** * *****. *** ******* **** **** * decision ** ** ******** ** ***, **** ***** **** *** the ******** ******* (*** **********) ******** *** ********. ** *** decision ** **** ** ***** *** ****** ***, ***** ** is ************ ** *** **********. **** ****** *** ********** ** bring ** * ****** ****** *** **** ** *** ** the ******** ******* *** ****** ********. **** *********** *** ******, the ******** ******* ***** ******* ****** *********** ** ** *** legitimacy ** *** ******’* ******* ** *** ********, *** ****. In **** ***** * ****** ***** ********* ** ******* **** of *** ******** ** ******** ******** **** ******* ******** ******* by ********* * ****** ** ********* ****.

"*** ********* ****** **** *** ******** * ****** *** ******* to ** ****, *** ** ***** ** **********," *** ****. "At *******, *** ********** ****** ****** ** ******** ** ******** immediately. ****** ******** ******* ** ***** ****** **** ** *** helps **** * ******** *** ** *** *********. *********** ***** particular ****** ********* *** *********** *** ***** ** *********.”

Incident ****

******** ******** *** ******** ** ******** * *** ** *** encounters ** ********* **** **** ******** **** *** ****** ** their *****. ***** ******** *** ********** ***** ********* *** *** turned ** ** *** ***** ********** ** *** *** ** their ******. *** ******* ** ******** ** **** ******* ***** he ** *** *** ********** ****** *** ****** ****, ** which **** *** ***-**** ** ******** ** *** ********** *** archived. ***** ******** ******** ** *** ***** ** **** ***** *** all **-****** ******** ******** **** ******** ** ******. ************* ** the ****** ******, ****’*, *** ***** *********** *********** **** ****** along ** **** ** ********** ** * ***** ***** ******** sheet.

Communication ******* ******* ***** *** ********

******** **** *** ** *** **** ********* ****** ***** ******* in * ******* ********** ** ************* **** ***** *****. *** security ********** *** **** *** *** ******* *********** ** ******* information ** ******** *********, *** **** ************ ******** ******** ****** new-hire ************.

“**** ** ******** *** **** ********** ***** ** ****** ***," she ****. “** **** **** ** ***** ******** ********* ** what *** ********* ****** *** ******** **** ******* ** ******** systems, *** **** ***********, *** **** ** *********** **** *** security ********** ****** **** ******* *** *** ******** ****.”  

**** **** ** *********** *** ****?  “** ****’* **** ** necessarily **** **** ******* ** ******** ******* * *** ******* X *** ********”, *** ****. “*******, ** **** ** **** that *** ******* ** **** * *** ** **** ** be **** *** **** ******** ********** ********* (***) *** ** aggressive ****** *** ** ******** ** **** ** ** ******** that * ****** **** ***** **** ... **** *** ** know **** ** ****** **** ** *** ** *** ******* (or *******),” *** ****. **********, ** ****** ******** ******** *** security ***** ** **** ****** *** *** ********** **** ********** to ** ******** *** ****** **** ** ***** ***** ****.

Security *******

******* ********** *** *** ************** ** * ******** ********* ****** within *** ******** ******. ******* ***** **** ******* ** **** 57 ** **** *** * ******** ********* **** ** * potentially ******* ******* ** *******. “** **** ** *** ********* phone ****, *** ********** ***** **** ********** *** ******* ** that ****. ** ******* ***** **** **** ****** *** *** security *********** ****,” *** ****. ***** ***** **** **** *** security ****** ***-********* **** ** ******* *********** ***** ***-********* ********** requiring ********.

Security ********The security team tried to make sure they could respond anywhere in the three-building hospital campus in about two minutes (a five-story building, seven story building and a mental health facility that was a block away). While the closest responding officer moved in the direction of the needed assistance, the dispatcher would relay information about the scene obtained from both the caller and any security cameras in the area. If the call came through the emergency number, all available officers would respond.  

“** ********* ** *****," *** ****. “** *** ***** ******* on *** ***** **** ** **** ****** *** ***** ******* then *** ***** ******** ***** **** *** *** ****** ** their *****. ** *** ******* ****’* *** ********, **** **** would **** ****** ** ******."

The ***** ** ***** ************ ** * ******** *******The main function of security cameras at UNM Hospitals was to provide real time situational awareness for the security team. The dispatcher and often, one other security officer monitored the security cameras while the others were on patrol and could be dispatched to check out anything observed from the control room. The priority cameras were at the entrances and the emergency room. If there was an incident, the dispatcher would pull up those camera views, or the camera views of the incident and do a quick review of the previous footage.

** ******* ******** ****, "*** ******** **** * **** ******* of ******* ********* ***'* *** ** ********* ** ** ***. The ******** *** *** ****** ****, ****** ******* **** * push ** ***** ********** *** ***** *********."

************ *** ********** ******** ** ****’* ******* ****** ** ******* **********. ***********, *** ********* *** **** ***** *** ******** *** a ******** ********* ** ***** ****** “**** ****."

“******* ** ******** * **** **** *****, *** *** ***** would ****** *** *** ******* **** ***** ***** ***** **** up *** ******** ********* ** **** ** ***** ***** ******** for ****** ****** * ***** *** ** ******** **** ***** conceal * **** **,” *** ****. *** ******* ******* ** the **** **** ****** **** ***** **** ****** ***** ***** without ***** ****** ***** ******* ** *** ********, ** *** wristband ***** ******* *** *** ****** ** *** *****, *** their ******** ** ******** *** ******** **** ****** **** ******* evidence ** ******* ****.

** ****, ***** * **** *** ****** ** * ******** in *** ****** *** ******, **** ******** ******** *** ******* and ***** **** *** **** ***** *** ******* ***** ******** but *** ********** ** ******* *****.  “**, **** *****, ******* of ****** ** ** ********* ** *** ********, **** ** Las ****** *** ******** * **** *****. **** **** ** show *** ****** **** **** ***** **** ******* ** **** the ******* ******,” *** ****. *** ****** ** ***** *** half ***** **** **** ***********.

**** ******** ***** ******* ***** *** ***** ********* ******** **** put *** ** ***** ** **** *** *** * ***** who ***** ** ******* ******* ********* *** *** *******.  *** baby *** ****************** *** ***** ***** *** * ***** ********.

Comments (2)

I was involved in quoting monitoring services to a security guard company on a tender for 100 care facilities and hospitals. One area that I saw was a big opportunity for technology was sending a mobile guard to facilities at shift change to escort staff to the parking lot. These were facilities without a static guard however were paying for 1-3 mobile guard tours a day. When isuggested improvements I got push back either because the guard company was not comfortable with the technology or saw elimination of guards as a reduction of billable services to support his mobile group.

I am curious who was the change agent responsible forintroducing technology in the hospital ( code pink, access control,...)I

The Director of Security (Vito F. Capobianco) was very progressive. He was very open to ideas/suggestions. It also helped that we were very fortunate to have an administrator who not only supported us in every way she could but also trusted us.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...
China Public Video Surveillance Guide: From Skynet to Sharp Eyes on Jun 14, 2018
China is expanding its video surveillance network to achieve “100%” nationwide coverage by 2020, including facial recognition capabilities and a...
Access Control - Time & Attendance, Mustering and Mantraps Guide on Jun 13, 2018
Electronic access offers features that traditional mechanical locks cannot. While these features may not be as fundamental as keeping doors secure,...
ReconaSense - The AI / Access Control / Analytics / IoT / Video Company Profile on Jun 12, 2018
One company's ISC West booth stood out for displaying a light-up tower of buzzwords. The company, ReconaSense, pledged to be 'making sense of it...
The Benefits of An Access Control Test Door on Jun 08, 2018
Security system dealers can benefit from having their own access control test door both for demonstrations and training. Inside, we explain the...
Princeton Identity Access 200 Iris Scanners Examined on Jun 05, 2018
Iris recently registered a big jump as a preferred biometric in our Favorite Biometrics survey, but access-ready options can be difficult to...
Keypads For Access Control Tutorial on May 31, 2018
Keypad readers present huge risks to even the best access systems. If deployed improperly, keypads let people through locked doors almost as if...
French National Police Buy 10,400 Hikvision Body Cameras on May 31, 2018
France’s national police forces bought 10,400 Hikvision body cameras earlier this year, in a high-profile deal that’s coming into effect as the...
Ambitious Mobile Access Startup: Openpath on May 24, 2018
This team sold their last startup for hundreds of millions of dollars, now they have started Openpath to become a rare access control small...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...

Most Recent Industry Reports

IPVM Vulnerability Scanner Released on Jun 18, 2018
IPVM is proud to announce video surveillance's first and only cybersecurity vulnerability scanner. This tool allows quickly and simply...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
July 2018 IP Networking Course on Jun 16, 2018
The last chance to save $50 on registration is this Thursday, June 21st. Register now and save. This is the only networking course designed...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring Dahua as a 'cyber responsible partner',...
Amazon Ring Launches $10 Monthly Professional Alarm Monitoring on Jun 15, 2018
Amazon's Ring has announced an alarm system with 24/7 professional alarm monitoring for $10 per month, a fraction of the $30+ per month traditional...
Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...
Hikvision 12MP Fisheye Camera Tested (DS-2CD63C2F-IV) on Jun 14, 2018
Hikvision's DS-2CD63C2F-IV is their flagship panoramic camera, with a 12MP imager, 15m integrated IR, smart codec, and more. We tested the 63C2 in...
Four Major Outdoor Camera Install Problems on Jun 14, 2018
Over 140 integrators told us the top four camera installation mistakes that lead to unexpected problems and failures. Their comments often...
Security Sales Course Summer 2018 on Jun 14, 2018
Based on member's interest, IPVM is offering a security sales course this summer. Register Now - IPVM Security Sales Course Summer...
China Public Video Surveillance Guide: From Skynet to Sharp Eyes on Jun 14, 2018
China is expanding its video surveillance network to achieve “100%” nationwide coverage by 2020, including facial recognition capabilities and a...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact