FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates Bourbonnais, Illinois
The Complete Security Program (P2T2 ® ) PEOPLEPROGRAMS TRAININGTECHNOLOGY
PEOPLE Employees Selection criteria Background investigation Drug screening Exit interviews
PEOPLE Visitors Backgrounds Supervision Criminal history Legitimacy of visit
PROGRAMS Focuses on developing and implementing the right security programs Policy and Procedure Development Is there a policy and procedure plan accessible to all employees? Staffing and Organization How do you determine the number of security staff? Do you have a minimum staffing plan for each shift? What is the organization of the department?
PROGRAMS (cont’d) Emergency Preparedness Do you have a procedure in place in the event of a bomb threat? Do you have a procedure in place in the event of domestic or workplace violence? Do you have a procedure in place in the event of a civil disturbance? Do you have a procedure in place in the event of a fire? Do you have a procedure in place in the event of a hostage situation? Do you have a procedure in place for inclement weather? Do you have a procedure in place for a hazardous materials incident? Do you have a procedure in place in the event of terrorist activity?
TRAINING Focuses on security knowledge of staff Physical protection of people and property Security staff Non-security staff Training on personal safety and protection Security awareness training Proprietary vs. contractual security services Performance based contracts
TECHNOLOGY Making sure we use the right equipment to complete the process Access Control systems CCTV systems Alarm systems Communication / Intercom systems Lobby / Visitor Management systems ID systems
Key Elements to Successful Security Program: A Comprehensive Vulnerability Assessment A Written Security Plan Implementation Exercises and Evaluations Ongoing Updates and Revisions
The Security Vulnerability Assessment (SVA) Part I
The SVA Conducted annually, at minimum Conducted by a competent healthcare security professional Assesses risks inherent to the community health center environment
Purpose of an SVA Identification of Credible Threats From what and whom should the community health center be protecting itself against Identification of Critical Assets Who and what should the community health center be protecting Identification and Consequences Likely consequences of identified vulnerabilities Provision of Sound and Viable Security Recommendations Systematic improvements and or upgrades in P2T2®
Elements of the SVA A security vulnerability assessment includes a comprehensive review in key areas: Human Resources Employee Identification Systems / Practices Student Identification Visitor / Vendor Identification
Elements of the Assessment A security vulnerability assessment includes a comprehensive review in 12 key areas : Access Control CCTV / Monitoring Systems Duress Alarm Systems Parking Control Exterior Lighting Interior Lighting Training Structural Safeguards Cash Handling Staff Interviews Written Security Management Programs Physical Plant and Grounds
Elements of the Assessment A security vulnerability assessment also includes includes a comprehensive review of: Exterior Lighting Interior Lighting Structural Safeguards
The Written Security Plan Part II
Define the Purpose The purpose of the written plan should be to: First, protect the staff, clients and visitors Second, protect property Third, provide services
Objectives of the Plan Assign responsibility for the plan Provide orientation to all new employees,clients, and families Develop a system for reporting security incidents and emergencies Establish security performance standards Determine areas that are particularly vulnerable Evaluate the plan effectiveness annually
Assigning Responsibility Who is responsible for implementing security? What are his/her qualifications? Who does s/he report to? What gets reported? How often? What follow up action is needed?
Even if this is a good depiction of your security guard, this does NOT represent a good site security plan…...
Providing Orientation to Staff Overview of the security plan and purpose The mission of the community health center How to minimize security risks What emergency procedures to take during an incident How to report security incidents Emergency Codes Emergency Numbers What should be reported Key security services: Escorts
Reporting System Establish a system to: Collect pertinent security information Evaluate the information Every incident Aggregate data Establish goals to reduce or eliminate security hazards Monitor the ongoing effectiveness of goals Provide annual evaluation of security plan effectiveness
Performance Standards Standards should be developed to: Test staff knowledge, skill and participation in security program Monitor security inspection activities Evaluate security incident reporting
Vulnerable Areas Conduct annual security assessment to determine: Potential for harm to staff, clients, families, and visitors Potential for theft or damage to assets Frequency of security incidents
Annual Assessment of Security Evaluate the effectiveness of the security plan Determine goals for the next year Develop measurable performance standards List performance indicators
Implementing the Security Plan Part III
Develop Your Team Form a multi-disciplinary task force to: Create a purpose statement Design the elements of your security plan Conduct and review the security assessment (Careful consideration should be given for the use of an outside security consultant for the 1 st assessment)
Using The Threat Assessment Upon completion of the assessment, categorize the vulnerabilities: High Risk / High Cost to Correct High Risk / Low Cost to Correct Low Risk / High Cost to Correct Low Risk / Low Cost to Correct Report high risk, high cost recommendations to safety committee and Board of Directors / Senior Management for consideration and support
Quality Process Additionally: Develop and implement a quality process to reduce or eliminate security incidents Determine indicators based on past history, assessment data, etc. Measure and report your results regularly Evaluate the effectiveness at least annually
Questions & Thoughts… Steven S. Wilder Sorensen, Wilder & Associates Bourbonnais, IL