Medical Facilities Protect Against Unauthorized Access

There are numerous areas to secure in today’s medical facilities. Outside doors, of course, must offer protection against unauthorized access by patients, visitors, employees and outsiders. Similarly, doors to wards, rooms and offices must be safeguarded. But that is only the beginning of the story. There is also a growing need to restrict access to medicine storage cabinets, medicine carts, computers, medical records systems, ambulances and even parking lots.

Failure to monitor these areas can lead to equipment or prescription drug theft, employee assaults, mistakes with patient medications, confidential patient information being compromised or even ambulances being entered without permission.

But it is the sheer number of doors and cabinets within a medical facility that makes this a complex issue. What is required is a means of controlling access at any and all of these points despite thousands of employees that have different job duties, restricted areas, and work hours. Fortunately, with today’s access control systems, this can best be achieved via the establishment of an integrated system, one that can run off a medical facility’s existing IT network.

Access Control Systems – Simplified, Less Expensive

Although video surveillance camera systems have been IP-based for many years – meaning they are connected directly into existing IT networks using standard cabling – the access control industry initially lagged behind in transitioning to this technology.

In fact, until recently video surveillance and access control systems were installed completely independently and custom software often had to be created to allow communication and integration between systems or even with an IT network.

“Until a few years ago, security cameras and access control systems were completely separate and often proprietary,” states Charles Crenshaw, CEO of ISONAS Security Systems, one of the first companies to develop IP-at-the-door reader-controllers. “This meant incompatible installations, separate management software and multiple maintenance contracts.”

Fortunately, today’s access control systems are increasingly IP-based. By piggybacking on the existing network and its cabling, facility managers and security personnel can quickly and easily install door access readers to a common network switch with standard cables.

If the network switch has a built-in Power over Ethernet (PoE) feature – a common feature – it can even supply power to door access readers through the CAT-5 cabling, with no need to tap into building power. Comprehensive access control management software is then used to manage an unlimited number of readers from a single, web-enabled interface.

“IP-based access control systems reduce installation costs. That, combined with the continuing reduction in the cost of door access readers means the ‘cost per door’ has dropped significantly over the past 5 years,” says Crenshaw. “It is also much more scalable, so it’s very easy to start in one area and expand into other areas as needs expand or funding becomes available.”

Securing Doors

In 2010, Moundview Memorial Hospital & Clinics in Wisconsin decided to upgrade its physical security infrastructure with a new, IP-based access control system. Moundview Memorial provides 24-hour emergency care, clinic, inpatient care, outpatient services, diagnostic testing, surgical procedures and senior services.

According to Jim Franckowiak, Moundview Memorial’s Director of Information Technology, the previous attempt at access control involved a series of keys that were shared by individuals that need to enter important operational locations within the hospital.

“We routinely found ourselves having to track down keys and replace not only keys but locks as well if the keys were lost or if an employee left and forgot to turn their keys in,” explains Franckowiak.

His criteria in selecting an upgraded system included ease of installation, complete access control functionality include the ability to remotely lock down a controlled area if necessary, and the ability to manage the system via a web browser using a computer, tablet or Smartphone. He found these features in the IP-based system offered by ISONAS Security Systems.

“Having web access to the system I can access remotely, or from my iPad, is very convenient since it allows me to provide access to any door in the system no matter where I am at the moment,” said Franckowiak.

The system was initially deployed in a medical supplies storage area and later expanded to additional departments including the pharmacy, the IT server room, the emergency treatment facilities, and the mail room.

Installation of the hardware was done by in-house maintenance personnel that installed the low voltage CAT-5 cabling, the ISONAS PowerNet reader-controllers and the other door hardware such as locks and sensors. The IT department configured the management software.

Today, the system provides administrators at Moundview Memorial with accountability that was not previously available since the system automatically logs the identity of each person entering a door or accessing a facility along with the time of entry.

“Superior physical security applied to the security realities of today’s healthcare facilities environment is what we were after,” says Franckowiak. “And that’s what we got.”

Medication security

Every year in American hospitals approximately 400,000 patients become ill or injured as a result of a medication error. In as many as 7,000 of these cases the final outcome is death. With liability costs averaging more than $600,000 per incident, many hospitals are addressing shortcomings in its medication dispensing process.

At Sinai Hospital of Baltimore, MD, an area of concern was its medication storage. Nurses had to make repeated trips to a medication cart located in the hallway to pick up medications. With twenty or more cart doors and an unreliable, antiquated manual lock system, personnel struggled to maintain security.

Under the direction of Sinai Hospital patient care director Bonnie Hartley Faust, MS, MBA, RN, Sinai Hospital selected and installed 400 NetLock Medication Cabinets from Cygnus Inc. pre-integrated with a security access lock system from ISONAS. Each cabinet can be accessed with an employee badge, thus eliminating the need to remember a code or carry a key.

Using management software, reports are used to track who entered each cabinet and when. Any cabinet can be individually assigned access privileges for that location. For example, nurses and pharmacy staff can be allowed access to a defined list of cabinets and floors limited by specific hours. In addition, pharmacy personnel who stock cabinets can be assigned access at pre-defined time periods.

Securing other areas

Door access readers can now also be installed inside a fleet of ambulances that are either run by, or partnered with a hospital. In doing so, the access system’s management software can be updated to grant access to the EMTs that operate ambulances. Wireless technology can be used to automatically update the ambulances when they are parked in front of the hospital.

Parking lots is another application that may be of interest to a medical facility. Installing a centralized access control system and long-range readers at parking facilities reduces parking conflicts and makes it easier for the hospital personnel to enter the parking lots.

Not all of these areas, though, would necessarily come under the same person’s direct control, says Crenshaw. For that reason, the access control system’s management software has the ability to give administrators control over different portions of the system i.e. in-room cabinets might be monitored by a nursing department, the data center by the IT staff, and building entrances and parking access by the security group.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3