An Inside Look at Hospital Security

Author: Carlton Purvis, Published on Nov 18, 2013

Security in hospitals is critical and they spend lots of money on security systems and services (e.g., third largest industry employing security guards). How hospital security works and what issues they face are key concerns.

In this interview with Margarita Castillo CPP, who retired after 24 years at University of New Mexico Hospitals as Manager Security Operations and Security team member, she explains why hospitals are different from traditional security settings, how officers coordinate with medical staff and what technologies worked and didn’t.

Why * ******** ** ********* **** *** ***** ********“The most unique thing is the fact that, as security, we’re dealing with patients and people with all types of medical issues, sometimes life-threatening heath issues. That very fact delays our ability to move them (patients) immediately should an emergency situation occur that threatens the hospital at large," she said.

***** ***** ******** ********, *** ******** *** ******** ** ******** and *** ********* *** * **** *********. ******* ** ***** concerns, *** ** *** ******* ******** *************** ** **** *** the ******* ** ******** *** ****** *** ******** ****** ******* remotely **** *** ******** ******. “*** **** ***** ****** ***** sound ** *** ******** ****** *** ** **** *** ********** would ******* *** *****, ******-********** **** *** *** ***** ***** ****** *** ****," *** said. *** ******** **** ***** ******* ** *** ***** *** maintain *********, ****** ****** **** ***** ****** ** ****, ******** and ********* **** ***** ******* * ****.

Why *** ********* **** ** * *********** ********* **** ** *** ***** ** *** ******** **** the ******* ***** ** ********. ****** *** ********** ****** ** or *** ** *** ********* **** ****. *** ******* ** medical ****** ***** **** * ****** **** ** * ******* life-threatening ********* **** ******** ********* ****** * ******* ******** ** other ********* ********. ******* ****** ******* *** ***** ***** ** the ** ***** **** **** ** *****, *********** ******. “** a ******, ******* *** **** ** ***** ***** ***** *** to *** ********* ****** ** *** ******’* *********," *** ****. There *** ****** ** ***** *** ******** ******* ******** ** ****** the ** *** ******* ** *** **** *****.

***** *** ********* * ****** ******** *** ****** ******* ************* **,*** ******** ******* ***** ********* room ********.  “** ****’* **** *** ******* ** ****, ** was **** * ******* ******** ****** *** ****** ** *** day,” *** ****. 

Worst ******** ********** *** *** *** **** *** **** *********

******** **** **** ** *** **** ** ****, *** ***** attempt ** ****** ******* **** ****** *** **** ****’*, **** the ******** ********** *********** *** *** ** ******** ** ******** ID ******. *** ******** ** ***** *** ******** ** *** hospital ********* *** ****** **** **** ***** *********** ** ****** the **** ***** ***** ** *** ********** *********** ******** ** areas **** ** *** “***” *****. ******* **** ** * teaching ********, **** ** *** ******* ******** ** ********* **** assigned ******** *********** **** ******* **** ** ****** *** **** of *** ******** ********** ** ***** ********. ******* ******** ** residents **** ******* **** ******* *** ******* **** ******* **** allowed **** ********** ** ****** ***** ******** ** **** ******. The ******** **** ******** ******** *** ******** *** ******** **** the ******* ** ******** *** *** ****** ***** ******* ******. “We ******* ******** *** ******* **** * *** **** ** make ** ****** ** **** *** *******,” *** ****.

** *** *** ****’*, *** ******** *** ************* *** ******** readers *** * ***** ** ****** ***. *** ******** ********** included *** ***** ***** ******* ********** *** ******** *** ******* 750 ******** *******. ********* *** ********* ******** ******* ****** ***** 1000.

*** **** *** ********** **** *** *** **** **** *** most ********* ** *** ******* *** ******** ******** ** ****** the *** ** ** **** ** ****** ***** ** ****** to **** ********** ******** *******. “*** ******* ** ***** ** area *** ** *** *** ******* **** ***** ** ******* over ***** ******** ****** *********** ** *** ******** ******* **** regard ** *** ** *** ******. * ***** **** ** something ** ***** *** ** *** *** ** **********. *** example, ** *** *** ******** ** *** ****** ****** ****** and ***** *** ****** ** *** ******* ****, * ******** positioned ******** ****** *** * ******** ******* ***** **** * tool **** ****** ***/*** ** ****** ******* **** ***** ******* a ******** *** ** *** ******* **** ** **********. * think ** ** ***** ** **** * **** **** *** security *****.  **’* *** *****, *** **’* *** ** *** level ** ***** ** **,” *** ****. ******** **** ** should **** **** ***** *********** ** **** ********** ***** ********** where *** ***’* ** **** ** * ****** ** ***** aggressive ** **** ******* **** ***** *****.

Security ******* ********Security officers were cross-trained to perform a variety of duties as required by the assigned location. Permanent location assignment often lead to complacency so security officers now rotate through locations and must learn the different tasks associated with that specific location, such as the Emergency Room or the Mental Health Center. This included patrols of the assigned facility, dispatch duties, access control, monitoring and operation of the video surveillance system. For patrols, they were trained not only to identify possible security threats, but to also challenge or question people who appeared to be lost or out of place, including people who might be off their medications. The training they received for this purpose was called “Crisis Intervention Training."

“**** ****** ******** ** *** ******* ***** ** **********, **** present **** * ******* *** ** **** ** ***** **** to ***** **** ** ***** ********,” *** ****. *** ******** officers **** ******* ** ********* ********* ********** ** ****** ****** issues ** ****** ** ** *****. **** **** ** ******** is *** ****** ***** *** **** ******** ** ****** ***********.

******** **** *** ******* ****** ********** ********* *** “****** ************ ******** (***)” ** **** *** ****** ******** ** ***** **** *** to **** **** ****** ****** ****** **** ** ******** ******, or *****  ****** ****** ******, *** ** ********* ****** *** their ********** *** **** *** ********** ** ****** ****** ********.

*** *** ******** *** ******* ** *** *********** ****** ********** and ******* * ************ ******** *** ******** ** *** *** ****** ****** ****** to *** ****** ********. *** **** ******** ********** ******** *** training ******* **** **** ** ***** ** ** ***** *** their ************. *** **** ******** ********** ***** ***** ******** *** *** topics ** *** ****** ****** ********* **** **** ** *** Emergency **** **********.

***** ******** *** ** ****, * ******* ***** ******** ***** to **** ******** ********. *** ** *** ******** **** **** hospital *********, ******* ** ********, ******** ******** **** **** *** ******* *** security ** * ******* *****. ****** *** ******, *** ****** of ******** ***** **** **** ** ******** ** **. **** did *** ******* *** ******** ** ******* ********* ********** *** was ****** **** *** ***** ************ *** ****** ******* *******, or *** ********* *** ****** *******.

Challenging ** * ******** *******

“***** ** ******, ******** ******** *** ********** *********, **** *** pick * ****** *** **** ***** ***** ********* *** ***** that ****** *** * *****. *** ******* **** **** * decision ** ** ******** ** ***, **** ***** **** *** the ******** ******* (*** **********) ******** *** ********. ** *** decision ** **** ** ***** *** ****** ***, ***** ** is ************ ** *** **********. **** ****** *** ********** ** bring ** * ****** ****** *** **** ** *** ** the ******** ******* *** ****** ********. **** *********** *** ******, the ******** ******* ***** ******* ****** *********** ** ** *** legitimacy ** *** ******’* ******* ** *** ********, *** ****. In **** ***** * ****** ***** ********* ** ******* **** of *** ******** ** ******** ******** **** ******* ******** ******* by ********* * ****** ** ********* ****.

"*** ********* ****** **** *** ******** * ****** *** ******* to ** ****, *** ** ***** ** **********," *** ****. "At *******, *** ********** ****** ****** ** ******** ** ******** immediately. ****** ******** ******* ** ***** ****** **** ** *** helps **** * ******** *** ** *** *********. *********** ***** particular ****** ********* *** *********** *** ***** ** *********.”

Incident ****

******** ******** *** ******** ** ******** * *** ** *** encounters ** ********* **** **** ******** **** *** ****** ** their *****. ***** ******** *** ********** ***** ********* *** *** turned ** ** *** ***** ********** ** *** *** ** their ******. *** ******* ** ******** ** **** ******* ***** he ** *** *** ********** ****** *** ****** ****, ** which **** *** ***-**** ** ******** ** *** ********** *** archived. ***** ******** ******** ** *** ***** ** **** ***** *** all **-****** ******** ******** **** ******** ** ******. ************* ** the ****** ******, ****’*, *** ***** *********** *********** **** ****** along ** **** ** ********** ** * ***** ***** ******** sheet.

Communication ******* ******* ***** *** ********

******** **** *** ** *** **** ********* ****** ***** ******* in * ******* ********** ** ************* **** ***** *****. *** security ********** *** **** *** *** ******* *********** ** ******* information ** ******** *********, *** **** ************ ******** ******** ****** new-hire ************.

“**** ** ******** *** **** ********** ***** ** ****** ***," she ****. “** **** **** ** ***** ******** ********* ** what *** ********* ****** *** ******** **** ******* ** ******** systems, *** **** ***********, *** **** ** *********** **** *** security ********** ****** **** ******* *** *** ******** ****.”  

**** **** ** *********** *** ****?  “** ****’* **** ** necessarily **** **** ******* ** ******** ******* * *** ******* X *** ********”, *** ****. “*******, ** **** ** **** that *** ******* ** **** * *** ** **** ** be **** *** **** ******** ********** ********* (***) *** ** aggressive ****** *** ** ******** ** **** ** ** ******** that * ****** **** ***** **** ... **** *** ** know **** ** ****** **** ** *** ** *** ******* (or *******),” *** ****. **********, ** ****** ******** ******** *** security ***** ** **** ****** *** *** ********** **** ********** to ** ******** *** ****** **** ** ***** ***** ****.

Security *******

******* ********** *** *** ************** ** * ******** ********* ****** within *** ******** ******. ******* ***** **** ******* ** **** 57 ** **** *** * ******** ********* **** ** * potentially ******* ******* ** *******. “** **** ** *** ********* phone ****, *** ********** ***** **** ********** *** ******* ** that ****. ** ******* ***** **** **** ****** *** *** security *********** ****,” *** ****. ***** ***** **** **** *** security ****** ***-********* **** ** ******* *********** ***** ***-********* ********** requiring ********.

Security ********The security team tried to make sure they could respond anywhere in the three-building hospital campus in about two minutes (a five-story building, seven story building and a mental health facility that was a block away). While the closest responding officer moved in the direction of the needed assistance, the dispatcher would relay information about the scene obtained from both the caller and any security cameras in the area. If the call came through the emergency number, all available officers would respond.  

“** ********* ** *****," *** ****. “** *** ***** ******* on *** ***** **** ** **** ****** *** ***** ******* then *** ***** ******** ***** **** *** *** ****** ** their *****. ** *** ******* ****’* *** ********, **** **** would **** ****** ** ******."

The ***** ** ***** ************ ** * ******** *******The main function of security cameras at UNM Hospitals was to provide real time situational awareness for the security team. The dispatcher and often, one other security officer monitored the security cameras while the others were on patrol and could be dispatched to check out anything observed from the control room. The priority cameras were at the entrances and the emergency room. If there was an incident, the dispatcher would pull up those camera views, or the camera views of the incident and do a quick review of the previous footage.

** ******* ******** ****, "*** ******** **** * **** ******* of ******* ********* ***'* *** ** ********* ** ** ***. The ******** *** *** ****** ****, ****** ******* **** * push ** ***** ********** *** ***** *********."

************ *** ********** ******** ** ****’* ******* ****** ** ******* **********. ***********, *** ********* *** **** ***** *** ******** *** a ******** ********* ** ***** ****** “**** ****."

“******* ** ******** * **** **** *****, *** *** ***** would ****** *** *** ******* **** ***** ***** ***** **** up *** ******** ********* ** **** ** ***** ***** ******** for ****** ****** * ***** *** ** ******** **** ***** conceal * **** **,” *** ****. *** ******* ******* ** the **** **** ****** **** ***** **** ****** ***** ***** without ***** ****** ***** ******* ** *** ********, ** *** wristband ***** ******* *** *** ****** ** *** *****, *** their ******** ** ******** *** ******** **** ****** **** ******* evidence ** ******* ****.

** ****, ***** * **** *** ****** ** * ******** in *** ****** *** ******, **** ******** ******** *** ******* and ***** **** *** **** ***** *** ******* ***** ******** but *** ********** ** ******* *****.  “**, **** *****, ******* of ****** ** ** ********* ** *** ********, **** ** Las ****** *** ******** * **** *****. **** **** ** show *** ****** **** **** ***** **** ******* ** **** the ******* ******,” *** ****. *** ****** ** ***** *** half ***** **** **** ***********.

**** ******** ***** ******* ***** *** ***** ********* ******** **** put *** ** ***** ** **** *** *** * ***** who ***** ** ******* ******* ********* *** *** *******.  *** baby *** ****************** *** ***** ***** *** * ***** ********.

Comments (2)

* *** ******** ** ******* ********** ******** ** * ******** guard ******* ** * ****** *** *** **** ********** *** hospitals. *** **** **** * *** *** * *** *********** for ********** *** ******* * ****** ***** ** ********** ** shift ****** ** ****** ***** ** *** ******* ***. ***** were ********** ******* * ****** ***** ******* **** ****** *** 1-3 ****** ***** ***** * ***. **** ********** ************ * got **** **** ****** ******* *** ***** ******* *** *** comfortable **** *** ********** ** *** *********** ** ****** ** a ********* ** ******** ******** ** ******* *** ****** *****.

* ** ******* *** *** *** ****** ***** *********** ************** technology ** *** ******** ( **** ****, ****** *******,...)*

*** ******** ** ******** (**** *. **********) *** **** ***********. He *** **** **** ** *****/***********. ** **** ****** **** we **** **** ********* ** **** ** ************* *** *** only ********* ** ** ***** *** *** ***** *** **** trusted **.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Access Control Course Winter 2018 on Jan 04, 2018
Learn more below about the Winter 2018 IPVM Access Control Course. Register here. IPVM offers the most comprehensive access control course in the...
2018 Access Control Book Released on Jan 02, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing, significantly updated for...
Washington DC Surveillance Hackers Arrested on Dec 29, 2017
The US Department of Justice has announced that "Two Romanian Suspects Charged With Hacking of Metropolitan Police Department Surveillance Cameras...
WSJ Investigates China's Total Surveillance State on Dec 26, 2017
The WSJ is continuing its investigation into Chinese video surveillance. Following up on last month's WSJ Investigation of Hikvision, the WSJ is...
2018 Top Sales Interest For Integrators on Dec 20, 2017
130+ integrators answered: This is a key question, especially for manufacturers, as it impacts what areas to focus more on and what...
Lock Status Monitoring Tutorial on Dec 18, 2017
Just because your doors look secure does not mean they are. Unless access systems are using lock status monitoring, the doors and areas they...
BBC Features Dahua on Dec 13, 2017
Hikvision is not the only mega-Chinese video surveillance manufacturer getting global attention. Last month, the WSJ investigated Hikvision and now...
Access Controller Software Guide on Dec 11, 2017
Properly configuring access controllers software is key to a professional access system. These devices have fundamental settings that must be...
ZKAccess Control Tested on Dec 04, 2017
China manufacturer ZKTeco / ZKAcces has been expanding in the West, offering a low-cost access control platform. But how good is it? And how does...
Hazardous & Explosion Proof Access Control Tutorial on Nov 27, 2017
Controlling access to hazardous environments require equipment meeting specific ratings that certify they will not start fires. Understanding those...

Most Recent Industry Reports

This High Schooler Is Excited About His Future Security Career on Jan 15, 2018
A common lament is that smart, young people have little interest in surveillance systems. In fact, discussions like Should Talented Young People...
"First Of Its Kind" Stove Knob Alarm Sensor (2GIG) on Jan 15, 2018
At CES 2018, 2Gig/Nortek announced the Stove & Grill Guard, a "first of its kind" sensor in the security industry, allowing users to be...
Amazon Deep Learning Partnership With AgentVi on Jan 15, 2018
Amazon is aiming to grow its Kinesis Video Streams offering that "enables you to quickly build computer vision and ML applications" in the cloud....
Winter 2018 Camera Course Registration on Jan 14, 2018
Learn video surveillance and get certified. Save $50 on the course, ending this Thursday the 18th, plus get access to 2 class times - 'day' and...
Hikvision Removed From US Army Base, Congressional Hearing Called on Jan 12, 2018
Hikvision has been removed from a US Army Base and a US congressional committee is planning a hearing on cybersecurity risks and specifically,...
CES 2018 Show Final Report on Jan 12, 2018
This is IPVM's final edition of our 2018 CES show report. Below are already numerous images and commentary, with more coming tomorrow.   CES is...
Hanwha ExtraLux Camera Tested on Jan 11, 2018
Hanwha has released the latest in their Wisenet X line, the "extraLUX" series, claiming to "capture crystal clear, true-color images in low-light...
Security Integrator Project Management Certifications on Jan 10, 2018
Certifications are a common option for technology professionals looking to improve skills and gain validation. But how about for project...
Canon Launches World's Most Expensive IP Camera (ME20F-SHN) on Jan 09, 2018
Canon has launched the ME20F-SHN , likely the world's most expensive single imager, non-thermal, IP camera at ~$20,000. And Canon subsidiary...
Hikvision Declares 'Never Click On Links In Emails' on Jan 09, 2018
Hikvision is stepping up its cybersecurity efforts with a clear recommendation - to never click on links in emails: It is a surprising change...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact