A True Security Blanket

The new generation of electronic security systems is designed for pediatrics

Anti-abduction systems are now a common feature at birthing units and obstetric departments in hospitals nationwide. Over the last decade, facilities have opted to safeguard newborns with this specialized technology that provides protection to each infant.

In fact, it's become so common that mothers-to-be and their families now look for this technology when choosing a birthing hospital.

Influenced by the trend toward individual patient protection in the obstetric department, pediatric departments have been adopting similar technology.

Unfortunately, these systems have been inappropriately designed around the needs of obstetric departments, which are substantially different from pediatric departments, both in terms of the threat they are trying to defend against and the nature of their patient population.

Pediatrics Face More Risks

In the world of obstetrics, the security threat facing patients is singular and easily defined—abduction by a stranger. Since the danger is almost always external, building defenses against this threat is a straightforward step.

Things aren't quite so clear for pediatrics. The risks facing pediatric patients are multiple and vary considerably by patient.

Patients up to six months of age face the same risk of stranger abduction as newborns in the obstetrics department. According to the National Center for Missing and Exploited Children, 14 percent of the 126 infant abductions from hospitals between 1983 and March 2009 occurred in the pediatric department.

However, the NCMEC only records statistics on infant abduction by a stranger. This excludes children over six months of age and all family-related incidents.

There is no organization that specifically tracks abductions of older children from hospitals, whether by a family member or a stranger. However, the Office of Juvenile Justice and Delinquency Prevention, an arm of the Department of Justice, estimates that 17,000 kidnappings of individuals under 18 were reported to police in 2006. In half of these cases, the perpetrator was a family member. For children under 12, a family member was involved 70 percent of the time.

It is impossible to say how many of these crimes occurred in hospitals, but these numbers are enough to convince most hospitals that the threat is real.

Diverse Patients

The different security risks faced by pediatric departments are a reflection of the diverse patient population. This is another factor that makes infant protection technology an awkward fit for pediatrics.

The most obvious difference is in the range of patient ages. Obstetric departments deal only with newborns. A pediatric patient also could be a newborn, an 18 year old or any age in between. Infant protection systems are not designed to fit these older patients, who can easily pull them off. With most systems, this could lead to nuisance alarms, since they detect any attempt to tamper with the tag.

Another factor that sets pediatrics apart from obstetrics is the fact that these patients are sick. Pediatric patients may need to be transported frequently to other parts of the hospital for medical procedures. This poses two security problems: They have to pass outside the safe area, and for many medical procedures, the electronic tag must be removed.

A more Flexible Solution

These factors have led to the development of a system designed specifically for protecting pediatric patients: the Pedz system from Stanley Healthcare Solutions. After consulting with users of its Hugs infant protection system, Stanley built the Pedz system to give hospitals the flexibility they need for a pediatric application.

"It was really pressure from hospitals that pushed the development of this product," said Kevin Smith, product manager for patient security at Stanley Healthcare Solutions. "We just knew that we could build something better for pediatric users."

The Pedz system works very much like its sister product, the Hugs system. Every patient requiring protection wears an RFID tag on the wrist or ankle. Exit points from the pediatric department are equipped with door monitor devices that emit a low frequency field around the exit. When a protected patient approaches an exit, the tag detects this field and transmits its unique ID number and the exit location to the system.

The band is held in place by a clamp, which allows the curious young patient to safely tug on the tag or twist it without causing an alarm. Yet, any malicious attempt to detach the band or cut through it will immediately result in an alarm.

A special removal key enables staff members to remove a patient's tag for a medical procedure. When the patient returns, the tag is reattached with the same band. The transport is initiated in the system software, where the nurse informs the system that the tag is being removed from the patient temporarily. Afterward, the system automatically resumes monitoring the child.

The system also moves away from the "one-size-fits-all" model of infant protection and acknowledges that each patient has different requirements. Depending on the age and risk profile of the patient, the facility can choose to allow the patient to travel outside the department unescorted. This permission can be restricted to specific exits and times of the day, with automatic notification if the patient doesn't return.

The system makes it easier to keep tabs on the flow of patients in the department. The software records exactly when a patient left, which staff member authorized the departure and when they returned. Users can add their own notes to record custom information. This feature has proven so useful that early adopters of the system are actually using it as their main patient census tool.

A Common Platform

From an integration point of view, the Pedz system also is an easier fit than earlier electronic banding solutions. It shares a common platform with the Hugs system and Stanley Healthcare Solutions' new patient protection system, which helps hospitals supervise agitated patients.

Door monitors, receivers and other network devices all use Echelon Corp.'s LonWorks protocol, a widely used network technology for mission-critical applications. The devices all are connected to a single server. The server supports the various applications, feeding data to multiple client computers running specific application software. Each department sees only the client application designed for its clinical needs.

Adding a new application involves simply incorporating devices and tags and installing client applications on departmental computers. Devices also can be shared between different applications—a practical option for smaller hospitals, where obstetrics and pediatrics are combined or adjacent to each other.

For larger facilities where departments are spread apart, network devices can be connected to the server PC via a LonWorks-to-Ethernet device that piggybacks on an existing LAN, saving time and money on installation.

This article originally appeared in the issue of .

Featured

  • 2024 Security Today New Product of the Year Award Winners Announced

    More than 20 companies are being recognized this year for products that help keep us safe. Read Now

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3