An Inside Look at Hospital Security

Author: Carlton Purvis, Published on Nov 18, 2013

Security in hospitals is critical and they spend lots of money on security systems and services (e.g., third largest industry employing security guards). How hospital security works and what issues they face are key concerns.

In this interview with Margarita Castillo CPP, who retired after 24 years at University of New Mexico Hospitals as Manager Security Operations and Security team member, she explains why hospitals are different from traditional security settings, how officers coordinate with medical staff and what technologies worked and didn’t.

Why * ******** ** ********* **** *** ***** ********“The most unique thing is the fact that, as security, we’re dealing with patients and people with all types of medical issues, sometimes life-threatening heath issues. That very fact delays our ability to move them (patients) immediately should an emergency situation occur that threatens the hospital at large," she said.

***** ***** ******** ********, *** ******** *** ******** ** ******** and *** ********* *** * **** *********. ******* ** ***** concerns, *** ** *** ******* ******** *************** ** **** *** the ******* ** ******** *** ****** *** ******** ****** ******* remotely **** *** ******** ******. “*** **** ***** ****** ***** sound ** *** ******** ****** *** ** **** *** ********** would ******* *** *****, ******-********** **** *** *** ***** ***** ****** *** ****," *** said. *** ******** **** ***** ******* ** *** ***** *** maintain *********, ****** ****** **** ***** ****** ** ****, ******** and ********* **** ***** ******* * ****.

Why *** ********* **** ** * *********** ********* **** ** *** ***** ** *** ******** **** the ******* ***** ** ********. ****** *** ********** ****** ** or *** ** *** ********* **** ****. *** ******* ** medical ****** ***** **** * ****** **** ** * ******* life-threatening ********* **** ******** ********* ****** * ******* ******** ** other ********* ********. ******* ****** ******* *** ***** ***** ** the ** ***** **** **** ** *****, *********** ******. “** a ******, ******* *** **** ** ***** ***** ***** *** to *** ********* ****** ** *** ******’* *********," *** ****. There *** ****** ** ***** *** ******** ******* ******** ** ****** the ** *** ******* ** *** **** *****.

***** *** ********* * ****** ******** *** ****** ******* ************* **,*** ******** ******* ***** ********* room ********.  “** ****’* **** *** ******* ** ****, ** was **** * ******* ******** ****** *** ****** ** *** day,” *** ****. 

Worst ******** ********** *** *** *** **** *** **** *********

******** **** **** ** *** **** ** ****, *** ***** attempt ** ****** ******* **** ****** *** **** ****’*, **** the ******** ********** *********** *** *** ** ******** ** ******** ID ******. *** ******** ** ***** *** ******** ** *** hospital ********* *** ****** **** **** ***** *********** ** ****** the **** ***** ***** ** *** ********** *********** ******** ** areas **** ** *** “***” *****. ******* **** ** * teaching ********, **** ** *** ******* ******** ** ********* **** assigned ******** *********** **** ******* **** ** ****** *** **** of *** ******** ********** ** ***** ********. ******* ******** ** residents **** ******* **** ******* *** ******* **** ******* **** allowed **** ********** ** ****** ***** ******** ** **** ******. The ******** **** ******** ******** *** ******** *** ******** **** the ******* ** ******** *** *** ****** ***** ******* ******. “We ******* ******** *** ******* **** * *** **** ** make ** ****** ** **** *** *******,” *** ****.

** *** *** ****’*, *** ******** *** ************* *** ******** readers *** * ***** ** ****** ***. *** ******** ********** included *** ***** ***** ******* ********** *** ******** *** ******* 750 ******** *******. ********* *** ********* ******** ******* ****** ***** 1000.

*** **** *** ********** **** *** *** **** **** *** most ********* ** *** ******* *** ******** ******** ** ****** the *** ** ** **** ** ****** ***** ** ****** to **** ********** ******** *******. “*** ******* ** ***** ** area *** ** *** *** ******* **** ***** ** ******* over ***** ******** ****** *********** ** *** ******** ******* **** regard ** *** ** *** ******. * ***** **** ** something ** ***** *** ** *** *** ** **********. *** example, ** *** *** ******** ** *** ****** ****** ****** and ***** *** ****** ** *** ******* ****, * ******** positioned ******** ****** *** * ******** ******* ***** **** * tool **** ****** ***/*** ** ****** ******* **** ***** ******* a ******** *** ** *** ******* **** ** **********. * think ** ** ***** ** **** * **** **** *** security *****.  **’* *** *****, *** **’* *** ** *** level ** ***** ** **,” *** ****. ******** **** ** should **** **** ***** *********** ** **** ********** ***** ********** where *** ***’* ** **** ** * ****** ** ***** aggressive ** **** ******* **** ***** *****.

Security ******* ********Security officers were cross-trained to perform a variety of duties as required by the assigned location. Permanent location assignment often lead to complacency so security officers now rotate through locations and must learn the different tasks associated with that specific location, such as the Emergency Room or the Mental Health Center. This included patrols of the assigned facility, dispatch duties, access control, monitoring and operation of the video surveillance system. For patrols, they were trained not only to identify possible security threats, but to also challenge or question people who appeared to be lost or out of place, including people who might be off their medications. The training they received for this purpose was called “Crisis Intervention Training."

“**** ****** ******** ** *** ******* ***** ** **********, **** present **** * ******* *** ** **** ** ***** **** to ***** **** ** ***** ********,” *** ****. *** ******** officers **** ******* ** ********* ********* ********** ** ****** ****** issues ** ****** ** ** *****. **** **** ** ******** is *** ****** ***** *** **** ******** ** ****** ***********.

******** **** *** ******* ****** ********** ********* *** “****** ************ ******** (***)” ** **** *** ****** ******** ** ***** **** *** to **** **** ****** ****** ****** **** ** ******** ******, or *****  ****** ****** ******, *** ** ********* ****** *** their ********** *** **** *** ********** ** ****** ****** ********.

*** *** ******** *** ******* ** *** *********** ****** ********** and ******* * ************ ******** *** ******** ** *** *** ****** ****** ****** to *** ****** ********. *** **** ******** ********** ******** *** training ******* **** **** ** ***** ** ** ***** *** their ************. *** **** ******** ********** ***** ***** ******** *** *** topics ** *** ****** ****** ********* **** **** ** *** Emergency **** **********.

***** ******** *** ** ****, * ******* ***** ******** ***** to **** ******** ********. *** ** *** ******** **** **** hospital *********, ******* ** ********, ******** ******** **** **** *** ******* *** security ** * ******* *****. ****** *** ******, *** ****** of ******** ***** **** **** ** ******** ** **. **** did *** ******* *** ******** ** ******* ********* ********** *** was ****** **** *** ***** ************ *** ****** ******* *******, or *** ********* *** ****** *******.

Challenging ** * ******** *******

“***** ** ******, ******** ******** *** ********** *********, **** *** pick * ****** *** **** ***** ***** ********* *** ***** that ****** *** * *****. *** ******* **** **** * decision ** ** ******** ** ***, **** ***** **** *** the ******** ******* (*** **********) ******** *** ********. ** *** decision ** **** ** ***** *** ****** ***, ***** ** is ************ ** *** **********. **** ****** *** ********** ** bring ** * ****** ****** *** **** ** *** ** the ******** ******* *** ****** ********. **** *********** *** ******, the ******** ******* ***** ******* ****** *********** ** ** *** legitimacy ** *** ******’* ******* ** *** ********, *** ****. In **** ***** * ****** ***** ********* ** ******* **** of *** ******** ** ******** ******** **** ******* ******** ******* by ********* * ****** ** ********* ****.

"*** ********* ****** **** *** ******** * ****** *** ******* to ** ****, *** ** ***** ** **********," *** ****. "At *******, *** ********** ****** ****** ** ******** ** ******** immediately. ****** ******** ******* ** ***** ****** **** ** *** helps **** * ******** *** ** *** *********. *********** ***** particular ****** ********* *** *********** *** ***** ** *********.”

Incident ****

******** ******** *** ******** ** ******** * *** ** *** encounters ** ********* **** **** ******** **** *** ****** ** their *****. ***** ******** *** ********** ***** ********* *** *** turned ** ** *** ***** ********** ** *** *** ** their ******. *** ******* ** ******** ** **** ******* ***** he ** *** *** ********** ****** *** ****** ****, ** which **** *** ***-**** ** ******** ** *** ********** *** archived. ***** ******** ******** ** *** ***** ** **** ***** *** all **-****** ******** ******** **** ******** ** ******. ************* ** the ****** ******, ****’*, *** ***** *********** *********** **** ****** along ** **** ** ********** ** * ***** ***** ******** sheet.

Communication ******* ******* ***** *** ********

******** **** *** ** *** **** ********* ****** ***** ******* in * ******* ********** ** ************* **** ***** *****. *** security ********** *** **** *** *** ******* *********** ** ******* information ** ******** *********, *** **** ************ ******** ******** ****** new-hire ************.

“**** ** ******** *** **** ********** ***** ** ****** ***," she ****. “** **** **** ** ***** ******** ********* ** what *** ********* ****** *** ******** **** ******* ** ******** systems, *** **** ***********, *** **** ** *********** **** *** security ********** ****** **** ******* *** *** ******** ****.”  

**** **** ** *********** *** ****?  “** ****’* **** ** necessarily **** **** ******* ** ******** ******* * *** ******* X *** ********”, *** ****. “*******, ** **** ** **** that *** ******* ** **** * *** ** **** ** be **** *** **** ******** ********** ********* (***) *** ** aggressive ****** *** ** ******** ** **** ** ** ******** that * ****** **** ***** **** ... **** *** ** know **** ** ****** **** ** *** ** *** ******* (or *******),” *** ****. **********, ** ****** ******** ******** *** security ***** ** **** ****** *** *** ********** **** ********** to ** ******** *** ****** **** ** ***** ***** ****.

Security *******

******* ********** *** *** ************** ** * ******** ********* ****** within *** ******** ******. ******* ***** **** ******* ** **** 57 ** **** *** * ******** ********* **** ** * potentially ******* ******* ** *******. “** **** ** *** ********* phone ****, *** ********** ***** **** ********** *** ******* ** that ****. ** ******* ***** **** **** ****** *** *** security *********** ****,” *** ****. ***** ***** **** **** *** security ****** ***-********* **** ** ******* *********** ***** ***-********* ********** requiring ********.

Security ********The security team tried to make sure they could respond anywhere in the three-building hospital campus in about two minutes (a five-story building, seven story building and a mental health facility that was a block away). While the closest responding officer moved in the direction of the needed assistance, the dispatcher would relay information about the scene obtained from both the caller and any security cameras in the area. If the call came through the emergency number, all available officers would respond.  

“** ********* ** *****," *** ****. “** *** ***** ******* on *** ***** **** ** **** ****** *** ***** ******* then *** ***** ******** ***** **** *** *** ****** ** their *****. ** *** ******* ****’* *** ********, **** **** would **** ****** ** ******."

The ***** ** ***** ************ ** * ******** *******The main function of security cameras at UNM Hospitals was to provide real time situational awareness for the security team. The dispatcher and often, one other security officer monitored the security cameras while the others were on patrol and could be dispatched to check out anything observed from the control room. The priority cameras were at the entrances and the emergency room. If there was an incident, the dispatcher would pull up those camera views, or the camera views of the incident and do a quick review of the previous footage.

** ******* ******** ****, "*** ******** **** * **** ******* of ******* ********* ***'* *** ** ********* ** ** ***. The ******** *** *** ****** ****, ****** ******* **** * push ** ***** ********** *** ***** *********."

************ *** ********** ******** ** ****’* ******* ****** ** ******* **********. ***********, *** ********* *** **** ***** *** ******** *** a ******** ********* ** ***** ****** “**** ****."

“******* ** ******** * **** **** *****, *** *** ***** would ****** *** *** ******* **** ***** ***** ***** **** up *** ******** ********* ** **** ** ***** ***** ******** for ****** ****** * ***** *** ** ******** **** ***** conceal * **** **,” *** ****. *** ******* ******* ** the **** **** ****** **** ***** **** ****** ***** ***** without ***** ****** ***** ******* ** *** ********, ** *** wristband ***** ******* *** *** ****** ** *** *****, *** their ******** ** ******** *** ******** **** ****** **** ******* evidence ** ******* ****.

** ****, ***** * **** *** ****** ** * ******** in *** ****** *** ******, **** ******** ******** *** ******* and ***** **** *** **** ***** *** ******* ***** ******** but *** ********** ** ******* *****.  “**, **** *****, ******* of ****** ** ** ********* ** *** ********, **** ** Las ****** *** ******** * **** *****. **** **** ** show *** ****** **** **** ***** **** ******* ** **** the ******* ******,” *** ****. *** ****** ** ***** *** half ***** **** **** ***********.

**** ******** ***** ******* ***** *** ***** ********* ******** **** put *** ** ***** ** **** *** *** * ***** who ***** ** ******* ******* ********* *** *** *******.  *** baby *** ****************** *** ***** ***** *** * ***** ********.

Comments (2)

I was involved in quoting monitoring services to a security guard company on a tender for 100 care facilities and hospitals. One area that I saw was a big opportunity for technology was sending a mobile guard to facilities at shift change to escort staff to the parking lot. These were facilities without a static guard however were paying for 1-3 mobile guard tours a day. When isuggested improvements I got push back either because the guard company was not comfortable with the technology or saw elimination of guards as a reduction of billable services to support his mobile group.

I am curious who was the change agent responsible forintroducing technology in the hospital ( code pink, access control,...)I

The Director of Security (Vito F. Capobianco) was very progressive. He was very open to ideas/suggestions. It also helped that we were very fortunate to have an administrator who not only supported us in every way she could but also trusted us.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

2019 Access Control Book Released on Dec 12, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...
Multi-Factor Access Control Authentication Guide on Dec 10, 2018
Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting...
Top 2019 Trend - AI Video Analytics on Dec 10, 2018
160+ Integrators answered: What do you think the top industry trend will be in 2019? Why? AI / video analytics was the run-away winner with...
Infinova's Xinjiang Business Examined on Dec 07, 2018
As pressure mounts for companies to stop doing business in China’s Xinjiang region amid a severe human rights crisis, IPVM has found Infinova sold...
ADT Wins Fire Death Suit But Faces Appeal on Dec 05, 2018
ADT/Protection 1 has won a wrongful death court case in which it was sued by the estate of a deceased customer. However, the attorney for the...
Cybersecurity Insurance For Security Integrators on Nov 29, 2018
Most security industry professionals carry insurance to cover themselves in the event of a general loss. However, most are not carrying cyber...
Startup Qumulex Aims For Unified Platform, Adds Infinias Access Founder on Nov 29, 2018
The startup founded by former Exacq executives, Qumulex has hired Wayne Jared, founder of access control manufacturer Infinias and most recently a...
Evidence of Dahua's Involvement In Xinjiang Surveillance on Nov 28, 2018
IPVM adds new details about Dahua’s activities in Xinjiang, a Chinese region where mass surveillance used to facilitate grave human rights...
HID Product Configurator Examined on Nov 26, 2018
HID is widely used. However, figuring out all the different configurations of features for a final credential or reader part number can be a real...
Openpath Access Control Tested on Nov 20, 2018
Big investment in access startups is uncommon, but Openpath has recently attracted $20 million doing just that. The company has limited security...

Most Recent Industry Reports

2019 Access Control Book Released on Dec 12, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...
Huawei Hisilicon Quietly Powering Tens of Millions of Western IoT Devices on Dec 12, 2018
Huawei Hisilicon chips are powering, at least, tens of millions of Western IoT devices, such as IP cameras and surveillance recorders, a fact that...
FLIR Launches Body Cameras Unified With VMS (TruWitness) on Dec 11, 2018
While FLIR is best known for their thermal cameras, now they have expanded into body cameras, launching TruWITNESS, a public safety focused body...
Startup Sunflower Labs' Autonomous Drone Security System on Dec 11, 2018
Startup Sunflower Labs is claiming a unique design on a home security system, combining autonomous drones and 'Sunflower' sensors. Imagine an...
The 2019 Video Surveillance Industry Guide on Dec 10, 2018
The 300 page, 2019 Video Surveillance Industry Guide, covers the key events and the future of the video surveillance market, is now available,...
Multi-Factor Access Control Authentication Guide on Dec 10, 2018
Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting...
Top 2019 Trend - AI Video Analytics on Dec 10, 2018
160+ Integrators answered: What do you think the top industry trend will be in 2019? Why? AI / video analytics was the run-away winner with...
AV Tech Company Profile on Dec 07, 2018
Taiwanese manufacturer AV Tech's revenue declined ~70% since 2012. Planning a comeback, AV Tech spoke to IPVM about their opportunities and...
Ubiquiti $79 Flex IP Camera Tested on Dec 07, 2018
U.S. Manufacturer Ubiquiti has released a 1080p, integrated IR IP camera, selling it directly for $79, making this one of the least expensive IP...
Infinova's Xinjiang Business Examined on Dec 07, 2018
As pressure mounts for companies to stop doing business in China’s Xinjiang region amid a severe human rights crisis, IPVM has found Infinova sold...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact