jQuery Mobile Framework
Search Home >> Standards Wordwide >> Australia Standards(AS) >> AS 4485.2-1997 security for health care facilities - procedures guide

AS 4485.2-1997 security for health care facilities - procedures guide

Standard Number:  AS 4485.2-1997
Title:  security for health care facilities - procedures guide
Language:  English
Replacing Standard:  DR 96050

Publication Date:  1997/9/5
Status:  Current
Publisher:  Australia Standards(AS)
Price:  
Number of Pages:72P.;A4  

Description:Provides guidance for the development and implementation of the policy, principles and procedures necessary to establish and maintain an effective security service for health care facilities.  
Catalog:Document Contents
AS 4485.2-1997 SECURITY FOR HEALTH CARE FACILITIES - PROCEDURES GUIDE
PREFACE
CONTENTS
SECTION 1 SCOPE AND GENERAL
1.1 SCOPE
1.2 REFERENCED DOCUMENTS
1.3 DEFINITIONS
1.3.1 Burglar resistant areas
1.3.2 Chief executive officer (CEO)
1.3.3 Governing body
1.3.4 Health care facility
1.3.5 Intruder resistant areas
1.3.6 Outreach services
1.3.7 Protective security
1.3.8 Sensitive information
1.3.9 Special cases
1.3.10 Vettee
1.3.11 VIP (very important person)
SECTION 2 ORGANIZATION AND RESPONSIBILITY
2.1 GENERAL
2.2 RESPONSIBILITIES
2.2.1 General
2.2.2 Management
2.2.3 Line management
2.2.4 Individual staff
2.2.5 All other persons
2.3 EXTERNAL ASSISTANCE
2.4 ORGANIZATION
2.4.1 Formal appointment
2.4.2 Policy coordination
2.4.3 Cohesion
2.4.4 Demarcation of responsibilities
2.4.5 Computer security
2.5 SECURITY ADMINISTRATOR/ADVISER
2.5.1 General
2.5.2 Role of security administrator/adviser
2.5.3 Technical knowledge
2.5.4 Quick acquisition of knowledge
2.5.5 Other sources of expert advice
SECTION 3 ASSESSMENT OF SECURITY RISKS
3.1 GENERAL
3.2 RISK MANAGEMENT-OPTIONS
3.3 HOLISTIC OUTCOME
3.4 RESOURCE IDENTIFICATION
3.5 IMPORTANT ASSETS
3.6 INFORMATION
3.7 ASSESSMENT OF THREATS
3.7.1 General
3.7.2 Criminal risks
3.7.3 Non-deliberate threats
3.7.4 Sources of information
3.8 VULNERABILITY IDENTIFICATION
3.9 RISK ASSESSMENT
3.9.1 General
3.9.2 Measurement of risk
3.9.3 Strategies
3.9.4 Reducing vulnerabilities
3.10 RISK MANAGEMENT
SECTION 4 PROTECTION OF INFORMATION
4.1 GENERAL
4.2 CLASSIFIED MATERIAL
4.3 INTERNAL GUIDELINES
4.4 CLASSIFICATIONS
4.4.1 General
4.4.2 Highly protected
4.4.3 Protected
4.4.4 In-confidence
4.5 IMPORTANCE OF PROPER CLASSIFICATION
4.6 CLASSIFICATION OF DOCUMENTS
4.7 CLASSIFYING AND CONFIRMING CLASSIFICATIONS
4.8 CONFIRMATION OF CLASSIFICATIONS
4.9 MARKING THE CLASSIFICATION ON REMOVABLE COMPUTER DISKS, DISKETTES AND TAPES
4.10 CLASSIFICATION IMMEDIATELY EVIDENT
4.11 REASSESSMENT OF CLASSIFIED MATERIAL
4.12 ?SHELF-LIFE? OF MATERIAL
4.13 NEED TO KNOW
4.14 REPRODUCTION LIMITATIONS
4.15 TRANSFER OF INFORMATION TO OTHER INSTITUTIONS
4.16 SPECIAL SECURITY CLAUSES
SECTION 5 PHYSICAL SECURITY
5.1 GENERAL
5.2 DEFENCE IN DEPTH
5.3 BUILDING AND AREA SECURITY
5.4 LEVEL OF PROTECTION
5.5 SPECIALIST ADVICE
5.6 DESIGN AND CONSTRUCTION
5.7 SPECIAL CONSIDERATIONS FOR PATIENTS WITH PROTECTIVE STATUS (OTHER THAN PRISONERS)
5.7.1 General
5.7.2 Accommodation
5.8 PRISONER SECURITY
5.8.1 General
5.8.2 Accommodation
5.9 SECURITY EQUIPMENT
5.10 BURGLAR RESISTANT AND INTRUDER RESISTANT AREAS
5.10.1 General
5.10.2 Burglar resistant areas
5.10.3 Intruder resistant areas
5.10.4 Controlled areas
5.11 SECURE STORAGE
5.11.1 General
5.11.2 Security containers
5.11.3 Protection against forced attack
5.12 VALUABLE COLLECTABLES
5.13 ALARM SYSTEMS
5.14 ACCESS CONTROL
5.14.1 General
5.14.2 Level of access control
5.14.3 Alternative entries
5.14.4 Methods
5.14.5 Requirements
5.14.6 Suitability
5.15 PASSES OR IDENTITY CARDS
5.15.1 General
5.15.2 Pass configuration
5.15.3 Receipt and conditions
5.15.4 Colour coding
5.15.5 Compromise
5.15.6 Wearing of passes
5.15.7 Security of pass production equipment
5.16 VISITORS
5.16.1 General
5.16.2 Register
5.16.3 Visitors pass
5.16.4 Supervision of visitors
5.16.5 Accountability
5.17 MEDIA VISITORS
5.18 CLOSE OF BUSINESS
5.19 LOCKS
5.20 DOORS AND WINDOWS
5.21 KEYS
5.21.1 General
5.21.2 Key management
5.21.3 Key issue registers
5.21.4 Key issue authorization
5.21.5 Departmental internal keys
5.21.6 Keys for cleaning and maintenance staff
5.21.7 Key issue-long term
5.21.8 Arrangements for the safe custody of keys to special stores
5.21.9 Arrangement for the safe custody of filing/office cabinet keys giving access to cl...
5.21.10 Controlling the ordering of duplicate keys
5.22 COMBINATION LOCKS
5.22.1 General
5.22.2 Setting the lock
5.23 LIGHTING
5.24 CLOSED CIRCUIT TELEVISION (CCTV)
5.25 DURESS ALARMS
5.26 FENCES AND WALLS
5.27 CONTRACTS
5.28 SECURITY SIGNAGE
5.29 OFFENSIVE WEAPONS AND OTHER DANGEROUS ARTICLES
5.30 STORAGE AND DISPOSAL OF DANGEROUS GOODS
5.31 DISPOSAL OF CLINICAL WASTE
5.32 DRUG DIVERSION
5.33 DECEASED EFFECTS SECURITY
5.34 OPERATING ROOM SECURITY
5.35 EMERGENCY DEPARTMENT (ED) SECURITY
5.36 PROTOCOLS FOR SECURITY OUTSIDE NORMAL HOURS OF BUSINESS
5.37 PATIENT SECURITY
5.37.1 Wandering patients search
5.37.2 Restraining
5.37.3 Patient property security
5.38 PROPERTY ON LOAN OR IN TRANSIT
5.39 LOST AND FOUND PROPERTY
5.40 PARTICULAR SECURITY REQUIREMENTS FOR WARDS, DEPARTMENTS AND FACILITIES
5.40.1 Wards
5.40.2 Research, pathology and radiology laboratories
5.40.3 Nurseries
5.40.4 Special considerations in mental health facilities
5.40.5 Mortuary
5.40.6 Engineering equipment
5.41 CAR PARK SECURITY AND CONTROL
5.42 EQUIPMENT SECURITY AND ASSET CONTROL
5.43 VEHICLE AND AIRCRAFT SECURITY
SECTION 6 SECURITY FOR EXTERNAL SERVICES
6.1 INTRODUCTION
6.2 APPLICATION
6.3 GENERAL PROCEDURES FOR HOME VISITS
6.3.1 General
6.3.2 Precautions
6.3.3 Itinerary
6.3.4 Duress
6.3.5 Extended hours
6.4 AFTER-HOURS VISITS
6.4.1 General
6.4.2 Patient contact
6.4.3 Unsafe areas
6.4.4 Crisis situations
6.4.5 Assistance
6.5 GENERAL SECURITY MEASURES
6.6 EMERGENCY PROCEDURES
6.6.1 Calls for assistance
6.6.2 Suspicion or threat
6.7 CAR BREAKDOWNS
SECTION 7 SECURITY AND SAFETY OF PEOPLE
7.1 INTRODUCTION
7.2 APPLICATION
7.3 NATURE OF RISKS
7.4 RISKS TO PEOPLE
7.4.1 General
7.4.2 Outcomes
7.5 RESPONSIBILITY OF PEOPLE
7.6 SPECIAL CONSIDERATIONS
7.6.1 General
7.6.2 Isolated work areas
7.6.3 Movement of staff and others at night
7.6.4 Emergency departments
7.6.5 Mental health facilities
7.6.6 Staff living quarters
7.6.7 Public interface areas
7.6.8 Home visits
7.6.9 Storage of pharmaceuticals
7.6.10 Security and transport of currency and drugs
7.7 RISK REDUCTION
7.7.1 General
7.7.2 Personal security precautions in the workplace
7.7.3 Transport and vehicle parking
7.8 AGGRESSION INDICATORS
7.9 DEALING WITH AGGRESSION
7.9.1 Reaction
7.9.2 Staff faced with an aggressive person
7.9.3 For personal threat
SECTION 8 SCREENING OF PERSONNEL
8.1 INTRODUCTION
8.1.1 General
8.1.2 Responsibility
8.2 PERSONNEL PROBITY
8.3 RECRUITMENT SCREENING
8.4 CONFIDENTIALITY AGREEMENT
8.5 RIGHT OF REVIEW
8.6 STAFF UNDERTAKING VETTING PROCEDURES
8.7 ADDITIONAL VETTING
SECTION 9 SECURITY STAFF
9.1 PROTECTIVE SECURITY OFFICERS
9.1.1 General
9.1.2 Security services
9.1.3 Tasks and functions
9.1.4 Selection and vetting
9.1.5 Uniform, dress and bearing
9.1.6 Equipment
9.1.7 Proprietary versus contract services
9.1.8 Licensing
9.2 CUSTODIAL AND ESCORT OFFICERS
9.3 TRAINING
9.4 ADDITIONAL COMPETENCIES FOR SUPERVISORS
SECTION 10 GEOGRAPHICALLY REMOTE AREA HEALTH CARE FACILITIES
10.1 GENERAL
10.2 RECRUITMENT BRIEFING
10.3 SECURITY PROVISIONS
10.3.1 General
10.3.2 Accommodation
10.3.3 Lighting
10.3.4 Doors and windows
10.3.5 Fencing
10.3.6 Vehicle
10.3.7 Garaging and storage
10.3.8 Communications
10.3.9 Fire protection
10.3.10 Security awareness training
10.3.11 Emergency management plans
10.4 SECURITY POLICIES
SECTION 11 INCIDENT PROCEDURES
11.1 GENERAL
11.2 MINIMIZING THE POSSIBILITY OF RECURRENCE
11.3 PRESERVATION OF A CRIME SCENE
11.4 REPORTS AND STATISTICS, MANAGEMENT AND USE
11.5 CRIMINAL PROCEEDINGS
11.6 INCIDENT REPORT
11.7 POST-INCIDENT MANAGEMENT
11.7.1 General
11.7.2 Choice of people to provide support
11.7.3 Post-incident management
11.7.4 Supervisor?s role
11.7.5 Post-trauma
11.7.6 Critical incident stress debriefing
11.7.7 Post-incident debriefing
11.7.8 Counselling
SECTION 12 PHARMACY AND PHARMACEUTICALS SECURITY
12.1 GENERAL
12.2 APPLICATION
12.1.1 General
12.2.2 Responsibility
12.3 POLICIES AND PROCEDURES
12.4 FACILITIES AND EQUIPMENT
12.4.1 General
12.4.2 Design of storage areas
12.4.3 Secure, separate areas
12.4.4 Facilities and equipment
12.4.5 Holding areas
12.5 PHARMACY COMPUTER SYSTEMS
12.6 PURCHASING OF PHARMACEUTICALS
12.6.1 General
12.6.2 Valid orders
12.7 RECEIVING OF PHARMACEUTICALS (STOCK)
12.8 STORAGE OF PHARMACEUTICALS
12.9 INTERNAL DISTRIBUTION OF PHARMACEUTICALS
12.9.1 General
12.9.2 Transportation
SECTION 13 NEWBORN AND PAEDIATRIC SECURITY
13.1 GENERAL
13.1.1 General
13.1.2 Health care facilities
13.1.3 Security for newborns
13.1.4 Physical security
13.1.5 Parents? responsibility
13.1.6 Information file
13.2 NEWBORN AND PAEDIATRIC ABDUCTION
13.2.1 General
13.2.2 Response to a possible abduction
13.3 MEDIA STRATEGIES
13.4 PAEDIATRIC SECURITY
13.5 ADOLESCENT SECURITY
13.6 COUNTRY AND STAND-ALONE MATERNITY UNITS
13.7 CHILD-MINDING SERVICES
APPENDIX A - ROLE AND FUNCTIONS OF FACILITY SECURITY ADMINISTRATORS/ADVISERS
APPENDIX B - SECURITY CHECKLIST
APPENDIX C - DISPATCH OF CLASSIFIED MATERIAL BY COURIER
C1 COMMERCIAL COURIER SERVICE
C2 PROCEDURES
APPENDIX D - DISPATCH OF CLASSIFIED MATERIAL BY MAIL
  
File Format:  PDF(Acrobat Reader) or Word version doc Document
File Size:  618KB
Tile in English:  security for health care facilities - procedures guide

Full Text Information

Related

Top 10

New 10

PC Version