A True Security Blanket

The new generation of electronic security systems is designed for pediatrics

Anti-abduction systems are now a common feature at birthing units and obstetric departments in hospitals nationwide. Over the last decade, facilities have opted to safeguard newborns with this specialized technology that provides protection to each infant.

In fact, it's become so common that mothers-to-be and their families now look for this technology when choosing a birthing hospital.

Influenced by the trend toward individual patient protection in the obstetric department, pediatric departments have been adopting similar technology.

Unfortunately, these systems have been inappropriately designed around the needs of obstetric departments, which are substantially different from pediatric departments, both in terms of the threat they are trying to defend against and the nature of their patient population.

Pediatrics Face More Risks

In the world of obstetrics, the security threat facing patients is singular and easily defined—abduction by a stranger. Since the danger is almost always external, building defenses against this threat is a straightforward step.

Things aren't quite so clear for pediatrics. The risks facing pediatric patients are multiple and vary considerably by patient.

Patients up to six months of age face the same risk of stranger abduction as newborns in the obstetrics department. According to the National Center for Missing and Exploited Children, 14 percent of the 126 infant abductions from hospitals between 1983 and March 2009 occurred in the pediatric department.

However, the NCMEC only records statistics on infant abduction by a stranger. This excludes children over six months of age and all family-related incidents.

There is no organization that specifically tracks abductions of older children from hospitals, whether by a family member or a stranger. However, the Office of Juvenile Justice and Delinquency Prevention, an arm of the Department of Justice, estimates that 17,000 kidnappings of individuals under 18 were reported to police in 2006. In half of these cases, the perpetrator was a family member. For children under 12, a family member was involved 70 percent of the time.

It is impossible to say how many of these crimes occurred in hospitals, but these numbers are enough to convince most hospitals that the threat is real.

Diverse Patients

The different security risks faced by pediatric departments are a reflection of the diverse patient population. This is another factor that makes infant protection technology an awkward fit for pediatrics.

The most obvious difference is in the range of patient ages. Obstetric departments deal only with newborns. A pediatric patient also could be a newborn, an 18 year old or any age in between. Infant protection systems are not designed to fit these older patients, who can easily pull them off. With most systems, this could lead to nuisance alarms, since they detect any attempt to tamper with the tag.

Another factor that sets pediatrics apart from obstetrics is the fact that these patients are sick. Pediatric patients may need to be transported frequently to other parts of the hospital for medical procedures. This poses two security problems: They have to pass outside the safe area, and for many medical procedures, the electronic tag must be removed.

A more Flexible Solution

These factors have led to the development of a system designed specifically for protecting pediatric patients: the Pedz system from Stanley Healthcare Solutions. After consulting with users of its Hugs infant protection system, Stanley built the Pedz system to give hospitals the flexibility they need for a pediatric application.

"It was really pressure from hospitals that pushed the development of this product," said Kevin Smith, product manager for patient security at Stanley Healthcare Solutions. "We just knew that we could build something better for pediatric users."

The Pedz system works very much like its sister product, the Hugs system. Every patient requiring protection wears an RFID tag on the wrist or ankle. Exit points from the pediatric department are equipped with door monitor devices that emit a low frequency field around the exit. When a protected patient approaches an exit, the tag detects this field and transmits its unique ID number and the exit location to the system.

The band is held in place by a clamp, which allows the curious young patient to safely tug on the tag or twist it without causing an alarm. Yet, any malicious attempt to detach the band or cut through it will immediately result in an alarm.

A special removal key enables staff members to remove a patient's tag for a medical procedure. When the patient returns, the tag is reattached with the same band. The transport is initiated in the system software, where the nurse informs the system that the tag is being removed from the patient temporarily. Afterward, the system automatically resumes monitoring the child.

The system also moves away from the "one-size-fits-all" model of infant protection and acknowledges that each patient has different requirements. Depending on the age and risk profile of the patient, the facility can choose to allow the patient to travel outside the department unescorted. This permission can be restricted to specific exits and times of the day, with automatic notification if the patient doesn't return.

The system makes it easier to keep tabs on the flow of patients in the department. The software records exactly when a patient left, which staff member authorized the departure and when they returned. Users can add their own notes to record custom information. This feature has proven so useful that early adopters of the system are actually using it as their main patient census tool.

A Common Platform

From an integration point of view, the Pedz system also is an easier fit than earlier electronic banding solutions. It shares a common platform with the Hugs system and Stanley Healthcare Solutions' new patient protection system, which helps hospitals supervise agitated patients.

Door monitors, receivers and other network devices all use Echelon Corp.'s LonWorks protocol, a widely used network technology for mission-critical applications. The devices all are connected to a single server. The server supports the various applications, feeding data to multiple client computers running specific application software. Each department sees only the client application designed for its clinical needs.

Adding a new application involves simply incorporating devices and tags and installing client applications on departmental computers. Devices also can be shared between different applications—a practical option for smaller hospitals, where obstetrics and pediatrics are combined or adjacent to each other.

For larger facilities where departments are spread apart, network devices can be connected to the server PC via a LonWorks-to-Ethernet device that piggybacks on an existing LAN, saving time and money on installation.

This article originally appeared in the issue of .

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3