ABSTRACT

The healthcare industry is changing daily. With the advent of the Affordable Care Act and now the changes being made by the current administration, the financial outlook for healthcare is uncertain. Along with natural disasters, new diseases, and ransomware new challenges have developed for the healthcare security professional. One of the top security issues effecting hospitals today is workplace violence. People don’t usually act violently out of the blue. There are warning signs that can be missed or don’t get reported or, if they are reported, they may not be properly assessed and acted upon. Healthcare facilities need to have policies and procedures that require reporting of threatening or unusual behaviors. Having preventive policies and procedures in place is the first step in mitigating violence and providing a safe and security hospital.

Persons working in the healthcare security field need to have information and tools that will allow them to work effectively within the healthcare climate. This holds true for security as well. Security professionals need to understand their risks and work to effectively mitigate threats. The author describes training techniques that can be accomplished within a limited budget. He explains how to manage staff more efficiently in order to save money and implement strategic plans to help acquire resources within a restricted revenue environment. Processes to manage emergent events, provide risk assessments, evaluate technology and understand information technology. The future of healthcare is uncertain, but proactive prevention and effective resolution provide the resources necessary to meet the challenges of the current and future healthcare security environment.

chapter Chapter 1|24 pages

Regulatory Compliance

chapter Chapter 2|18 pages

Management of Personnel

chapter Chapter 3|18 pages

Training Security Personnel

chapter Chapter 4|16 pages

Proactive Crime Prevention

chapter Chapter 5|10 pages

Incident and Event Investigation

chapter Chapter 6|16 pages

Emergency Response

chapter Chapter 8|16 pages

Predictive Analytics: Metrics Use and Evaluation

chapter Chapter 9|12 pages

Violence Prevention

chapter Chapter 10|10 pages

Information Security Management

chapter Chapter 11|14 pages

Evaluating Security Technology

chapter Chapter 12|10 pages

The Security Survey