An Inside Look at Hospital Security

Author: Carlton Purvis, Published on Nov 18, 2013

Security in hospitals is critical and they spend lots of money on security systems and services (e.g., third largest industry employing security guards). How hospital security works and what issues they face are key concerns.

In this interview with Margarita Castillo CPP, who retired after 24 years at University of New Mexico Hospitals as Manager Security Operations and Security team member, she explains why hospitals are different from traditional security settings, how officers coordinate with medical staff and what technologies worked and didn’t.

Why * ******** ** ********* **** *** ***** ********“The most unique thing is the fact that, as security, we’re dealing with patients and people with all types of medical issues, sometimes life-threatening heath issues. That very fact delays our ability to move them (patients) immediately should an emergency situation occur that threatens the hospital at large," she said.

***** ***** ******** ********, *** ******** *** ******** ** ******** and *** ********* *** * **** *********. ******* ** ***** concerns, *** ** *** ******* ******** *************** ** **** *** the ******* ** ******** *** ****** *** ******** ****** ******* remotely **** *** ******** ******. “*** **** ***** ****** ***** sound ** *** ******** ****** *** ** **** *** ********** would ******* *** *****, ******-********** **** *** *** ***** ***** ****** *** ****," *** said. *** ******** **** ***** ******* ** *** ***** *** maintain *********, ****** ****** **** ***** ****** ** ****, ******** and ********* **** ***** ******* * ****.

Why *** ********* **** ** * *********** ********* **** ** *** ***** ** *** ******** **** the ******* ***** ** ********. ****** *** ********** ****** ** or *** ** *** ********* **** ****. *** ******* ** medical ****** ***** **** * ****** **** ** * ******* life-threatening ********* **** ******** ********* ****** * ******* ******** ** other ********* ********. ******* ****** ******* *** ***** ***** ** the ** ***** **** **** ** *****, *********** ******. “** a ******, ******* *** **** ** ***** ***** ***** *** to *** ********* ****** ** *** ******’* *********," *** ****. There *** ****** ** ***** *** ******** ******* ******** ** ****** the ** *** ******* ** *** **** *****.

***** *** ********* * ****** ******** *** ****** ******* ************* **,*** ******** ******* ***** ********* room ********.  “** ****’* **** *** ******* ** ****, ** was **** * ******* ******** ****** *** ****** ** *** day,” *** ****. 

Worst ******** ********** *** *** *** **** *** **** *********

******** **** **** ** *** **** ** ****, *** ***** attempt ** ****** ******* **** ****** *** **** ****’*, **** the ******** ********** *********** *** *** ** ******** ** ******** ID ******. *** ******** ** ***** *** ******** ** *** hospital ********* *** ****** **** **** ***** *********** ** ****** the **** ***** ***** ** *** ********** *********** ******** ** areas **** ** *** “***” *****. ******* **** ** * teaching ********, **** ** *** ******* ******** ** ********* **** assigned ******** *********** **** ******* **** ** ****** *** **** of *** ******** ********** ** ***** ********. ******* ******** ** residents **** ******* **** ******* *** ******* **** ******* **** allowed **** ********** ** ****** ***** ******** ** **** ******. The ******** **** ******** ******** *** ******** *** ******** **** the ******* ** ******** *** *** ****** ***** ******* ******. “We ******* ******** *** ******* **** * *** **** ** make ** ****** ** **** *** *******,” *** ****.

** *** *** ****’*, *** ******** *** ************* *** ******** readers *** * ***** ** ****** ***. *** ******** ********** included *** ***** ***** ******* ********** *** ******** *** ******* 750 ******** *******. ********* *** ********* ******** ******* ****** ***** 1000.

*** **** *** ********** **** *** *** **** **** *** most ********* ** *** ******* *** ******** ******** ** ****** the *** ** ** **** ** ****** ***** ** ****** to **** ********** ******** *******. “*** ******* ** ***** ** area *** ** *** *** ******* **** ***** ** ******* over ***** ******** ****** *********** ** *** ******** ******* **** regard ** *** ** *** ******. * ***** **** ** something ** ***** *** ** *** *** ** **********. *** example, ** *** *** ******** ** *** ****** ****** ****** and ***** *** ****** ** *** ******* ****, * ******** positioned ******** ****** *** * ******** ******* ***** **** * tool **** ****** ***/*** ** ****** ******* **** ***** ******* a ******** *** ** *** ******* **** ** **********. * think ** ** ***** ** **** * **** **** *** security *****.  **’* *** *****, *** **’* *** ** *** level ** ***** ** **,” *** ****. ******** **** ** should **** **** ***** *********** ** **** ********** ***** ********** where *** ***’* ** **** ** * ****** ** ***** aggressive ** **** ******* **** ***** *****.

Security ******* ********Security officers were cross-trained to perform a variety of duties as required by the assigned location. Permanent location assignment often lead to complacency so security officers now rotate through locations and must learn the different tasks associated with that specific location, such as the Emergency Room or the Mental Health Center. This included patrols of the assigned facility, dispatch duties, access control, monitoring and operation of the video surveillance system. For patrols, they were trained not only to identify possible security threats, but to also challenge or question people who appeared to be lost or out of place, including people who might be off their medications. The training they received for this purpose was called “Crisis Intervention Training."

“**** ****** ******** ** *** ******* ***** ** **********, **** present **** * ******* *** ** **** ** ***** **** to ***** **** ** ***** ********,” *** ****. *** ******** officers **** ******* ** ********* ********* ********** ** ****** ****** issues ** ****** ** ** *****. **** **** ** ******** is *** ****** ***** *** **** ******** ** ****** ***********.

******** **** *** ******* ****** ********** ********* *** “****** ************ ******** (***)” ** **** *** ****** ******** ** ***** **** *** to **** **** ****** ****** ****** **** ** ******** ******, or *****  ****** ****** ******, *** ** ********* ****** *** their ********** *** **** *** ********** ** ****** ****** ********.

*** *** ******** *** ******* ** *** *********** ****** ********** and ******* * ************ ******** *** ******** ** *** *** ****** ****** ****** to *** ****** ********. *** **** ******** ********** ******** *** training ******* **** **** ** ***** ** ** ***** *** their ************. *** **** ******** ********** ***** ***** ******** *** *** topics ** *** ****** ****** ********* **** **** ** *** Emergency **** **********.

***** ******** *** ** ****, * ******* ***** ******** ***** to **** ******** ********. *** ** *** ******** **** **** hospital *********, ******* ** ********, ******** ******** **** **** *** ******* *** security ** * ******* *****. ****** *** ******, *** ****** of ******** ***** **** **** ** ******** ** **. **** did *** ******* *** ******** ** ******* ********* ********** *** was ****** **** *** ***** ************ *** ****** ******* *******, or *** ********* *** ****** *******.

Challenging ** * ******** *******

“***** ** ******, ******** ******** *** ********** *********, **** *** pick * ****** *** **** ***** ***** ********* *** ***** that ****** *** * *****. *** ******* **** **** * decision ** ** ******** ** ***, **** ***** **** *** the ******** ******* (*** **********) ******** *** ********. ** *** decision ** **** ** ***** *** ****** ***, ***** ** is ************ ** *** **********. **** ****** *** ********** ** bring ** * ****** ****** *** **** ** *** ** the ******** ******* *** ****** ********. **** *********** *** ******, the ******** ******* ***** ******* ****** *********** ** ** *** legitimacy ** *** ******’* ******* ** *** ********, *** ****. In **** ***** * ****** ***** ********* ** ******* **** of *** ******** ** ******** ******** **** ******* ******** ******* by ********* * ****** ** ********* ****.

"*** ********* ****** **** *** ******** * ****** *** ******* to ** ****, *** ** ***** ** **********," *** ****. "At *******, *** ********** ****** ****** ** ******** ** ******** immediately. ****** ******** ******* ** ***** ****** **** ** *** helps **** * ******** *** ** *** *********. *********** ***** particular ****** ********* *** *********** *** ***** ** *********.”

Incident ****

******** ******** *** ******** ** ******** * *** ** *** encounters ** ********* **** **** ******** **** *** ****** ** their *****. ***** ******** *** ********** ***** ********* *** *** turned ** ** *** ***** ********** ** *** *** ** their ******. *** ******* ** ******** ** **** ******* ***** he ** *** *** ********** ****** *** ****** ****, ** which **** *** ***-**** ** ******** ** *** ********** *** archived. ***** ******** ******** ** *** ***** ** **** ***** *** all **-****** ******** ******** **** ******** ** ******. ************* ** the ****** ******, ****’*, *** ***** *********** *********** **** ****** along ** **** ** ********** ** * ***** ***** ******** sheet.

Communication ******* ******* ***** *** ********

******** **** *** ** *** **** ********* ****** ***** ******* in * ******* ********** ** ************* **** ***** *****. *** security ********** *** **** *** *** ******* *********** ** ******* information ** ******** *********, *** **** ************ ******** ******** ****** new-hire ************.

“**** ** ******** *** **** ********** ***** ** ****** ***," she ****. “** **** **** ** ***** ******** ********* ** what *** ********* ****** *** ******** **** ******* ** ******** systems, *** **** ***********, *** **** ** *********** **** *** security ********** ****** **** ******* *** *** ******** ****.”  

**** **** ** *********** *** ****?  “** ****’* **** ** necessarily **** **** ******* ** ******** ******* * *** ******* X *** ********”, *** ****. “*******, ** **** ** **** that *** ******* ** **** * *** ** **** ** be **** *** **** ******** ********** ********* (***) *** ** aggressive ****** *** ** ******** ** **** ** ** ******** that * ****** **** ***** **** ... **** *** ** know **** ** ****** **** ** *** ** *** ******* (or *******),” *** ****. **********, ** ****** ******** ******** *** security ***** ** **** ****** *** *** ********** **** ********** to ** ******** *** ****** **** ** ***** ***** ****.

Security *******

******* ********** *** *** ************** ** * ******** ********* ****** within *** ******** ******. ******* ***** **** ******* ** **** 57 ** **** *** * ******** ********* **** ** * potentially ******* ******* ** *******. “** **** ** *** ********* phone ****, *** ********** ***** **** ********** *** ******* ** that ****. ** ******* ***** **** **** ****** *** *** security *********** ****,” *** ****. ***** ***** **** **** *** security ****** ***-********* **** ** ******* *********** ***** ***-********* ********** requiring ********.

Security ********The security team tried to make sure they could respond anywhere in the three-building hospital campus in about two minutes (a five-story building, seven story building and a mental health facility that was a block away). While the closest responding officer moved in the direction of the needed assistance, the dispatcher would relay information about the scene obtained from both the caller and any security cameras in the area. If the call came through the emergency number, all available officers would respond.  

“** ********* ** *****," *** ****. “** *** ***** ******* on *** ***** **** ** **** ****** *** ***** ******* then *** ***** ******** ***** **** *** *** ****** ** their *****. ** *** ******* ****’* *** ********, **** **** would **** ****** ** ******."

The ***** ** ***** ************ ** * ******** *******The main function of security cameras at UNM Hospitals was to provide real time situational awareness for the security team. The dispatcher and often, one other security officer monitored the security cameras while the others were on patrol and could be dispatched to check out anything observed from the control room. The priority cameras were at the entrances and the emergency room. If there was an incident, the dispatcher would pull up those camera views, or the camera views of the incident and do a quick review of the previous footage.

** ******* ******** ****, "*** ******** **** * **** ******* of ******* ********* ***'* *** ** ********* ** ** ***. The ******** *** *** ****** ****, ****** ******* **** * push ** ***** ********** *** ***** *********."

************ *** ********** ******** ** ****’* ******* ****** ** ******* **********. ***********, *** ********* *** **** ***** *** ******** *** a ******** ********* ** ***** ****** “**** ****."

“******* ** ******** * **** **** *****, *** *** ***** would ****** *** *** ******* **** ***** ***** ***** **** up *** ******** ********* ** **** ** ***** ***** ******** for ****** ****** * ***** *** ** ******** **** ***** conceal * **** **,” *** ****. *** ******* ******* ** the **** **** ****** **** ***** **** ****** ***** ***** without ***** ****** ***** ******* ** *** ********, ** *** wristband ***** ******* *** *** ****** ** *** *****, *** their ******** ** ******** *** ******** **** ****** **** ******* evidence ** ******* ****.

** ****, ***** * **** *** ****** ** * ******** in *** ****** *** ******, **** ******** ******** *** ******* and ***** **** *** **** ***** *** ******* ***** ******** but *** ********** ** ******* *****.  “**, **** *****, ******* of ****** ** ** ********* ** *** ********, **** ** Las ****** *** ******** * **** *****. **** **** ** show *** ****** **** **** ***** **** ******* ** **** the ******* ******,” *** ****. *** ****** ** ***** *** half ***** **** **** ***********.

**** ******** ***** ******* ***** *** ***** ********* ******** **** put *** ** ***** ** **** *** *** * ***** who ***** ** ******* ******* ********* *** *** *******.  *** baby *** ****************** *** ***** ***** *** * ***** ********.

Comments (2)

* *** ******** ** ******* ********** ******** ** * ******** guard ******* ** * ****** *** *** **** ********** *** hospitals. *** **** **** * *** *** * *** *********** for ********** *** ******* * ****** ***** ** ********** ** shift ****** ** ****** ***** ** *** ******* ***. ***** were ********** ******* * ****** ***** ******* **** ****** *** 1-3 ****** ***** ***** * ***. **** ********** ************ * got **** **** ****** ******* *** ***** ******* *** *** comfortable **** *** ********** ** *** *********** ** ****** ** a ********* ** ******** ******** ** ******* *** ****** *****.

* ** ******* *** *** *** ****** ***** *********** ************** technology ** *** ******** ( **** ****, ****** *******,...)*

*** ******** ** ******** (**** *. **********) *** **** ***********. He *** **** **** ** *****/***********. ** **** ****** **** we **** **** ********* ** **** ** ************* *** *** only ********* ** ** ***** *** *** ***** *** **** trusted **.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

PoE Powered Access Control Tutorial on Oct 12, 2017
Powering access control with Power over Ethernet, like for IP cameras, has become increasingly common.  However, the demands for access power are...
Dahua Access Control Tested on Oct 10, 2017
Can Dahua become a major force in access control? We bought Dahua's ASC1202B to find out. We tested Dahua access and its management application...
Exporting Video Surveillance Tutorial on Oct 05, 2017
Exporting video surveillance is important when incidents or crimes occur. However, there are multiple ways to export video which have their pros...
Delayed Egress Access Control Tutorial on Oct 04, 2017
Is it ever legal to lock people into a building? The answer is: Yes... under specific situations. With so much of access control driven by life...
Propped Doors Access Control Tutorial on Sep 28, 2017
Doors should keep 'bad guys' out. One of the most basic problems with doors is people propping them open: Even worse, door propping...
ASIS Show 2017 Final Report on Sep 27, 2017
ASIS is in Dallas for 2017 and this is our final show report (compare to our 2016 ASIS show report). When walking in, one is greeted with Dahua's...
Access Control Job Walk Guide on Sep 26, 2017
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Genetec Launches Cloud Access Control (Synergis SaaS) on Sep 21, 2017
Genetec's cloud everything expansion continues, with their announcement of Synergis SaaS edition, joining their cloud video offering Stratocast,...
Automatic Door Operators For Access Tutorial on Sep 20, 2017
Opening and closing doors might sound simple, but it takes a high-tech piece of door hardware to pull it off. Integrating automatic door operators...
HID Buys Mercury Security on Sep 19, 2017
One of the biggest access control deals in years. Mercury Security, the most widely used access hardware OEM, and partner to 20+ manufacturers,...

Most Recent Industry Reports

Buy From B&H, Ship Direct From ADI on Oct 16, 2017
B&H, one of the largest online sellers of video surveillance equipment to end users, regularly purchases their video surveillance equipment...
Competing Against Siemens on Oct 16, 2017
Siemens entered the integration business with 15,000+ customers, through their acquisition of Security Technologies Group in 2001. Since that time,...
Geovision GV-EDR2100 Tested Vs Hikvision on Oct 16, 2017
A number of ADI's top selling IP cameras are, at least surprisingly to us, from Geovision. We recently bought and tested the Geovision EDR2100...
Top Problems Searching Surveillance Video (Statistics) on Oct 13, 2017
When crimes, accidents or incidents happen, the video surveillance system is a key component in finding out and proving what actually...
Exacq M Series Low Cost NVR Tested on Oct 12, 2017
With recent cyber security issues hitting NVRs and cameras from low cost leaders Dahua and Hikvision, users are increasingly seeking alternatives...
Long Time Industry Exec Leads New Security Franchise Offering on Oct 12, 2017
John Nemerofsky previously built and sold a $150 million dollar integration business, and then was VP of Niscayah from its spinout of Securitas,...
PoE Powered Access Control Tutorial on Oct 12, 2017
Powering access control with Power over Ethernet, like for IP cameras, has become increasingly common.  However, the demands for access power are...
Knightscope Rockets To $20 Million Funding on Oct 11, 2017
Knightscope is celebrating. 15 months after running over a child and 3 months after a Knightscope robot drowned, Knightscope is having the last...
Avigilon / Canon New Lawsuits, No Settlement on Oct 11, 2017
In July, Canon sued Avigilon, a notably rare move amongst major players in the industry, including Canon's subsidiaries Axis and Milestone. At...
Surveillance Systems Remote Access Usage Statistics on Oct 11, 2017
Remote access is a major benefit and risk for video surveillance. It is a benefit because it allows users to manage security or review...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact