The Picture of Health

New Yorkers recently had their trust violated when they found out that a Long Island pediatrician was indicted for sedating young girls in his office and sexually assaulting them as part of what he told them was a “medical procedure.” The main evidence against the pediatrician? Video of the crimes, recorded by a surveillance camera hidden among items on the doctor’s desk.

Doctors typically use cameras to prevent criminal behavior rather than to record it. Prescription drugs are enticing, and even regular medical supplies, especially needles, can be a target for a petty thief – or an unscrupulous employee. There’s always good, old-fashioned money to steal, too, from the cash register or from unaware patients biding their time in the waiting room.

Surveillance cameras can prevent and help prosecute these losses, but installing them in medical offices raises a host of privacy issues, much as the camera in the Long Island pediatrician’s office would have had patients known it was there. An expert in burglar and alarm law, Ken Kirschenbaum, of Kirschenbaum & Kirschenbaum PC, said cameras in doctor’s offices often inhabit a legal gray area.

“Many jurisdictions have specific statutory prohibitions for particular areas – bathrooms, dressing areas, bedrooms – where it’s illegal to install and utilize cameras,” he sad.

He added that there are two types of law surveillance systems could violate. The first a statute such as those he mentioned, where state specifically bars cameras in doctors’ offices. The second comes from common law. This commonsense legal tradition holds that it is unlawful to have surveillance in areas where a person can have a reasonable expectation of personal privacy, because the surveillance would violate that expectation of privacy.

Kirschenbaum said that, depending on the state, the liability for privacy violations can extend beyond the end users to include integrators who install a system in an area such as a patient examining room in which it will clearly violate a person’s privacy. This is something integrators should watch out for.

But doctors need not consign themselves to the continual loss of supplies and cash to theft; Kirschenbaum said that, in his opinion, doctors can install cameras in such a way as to avoid legal trouble.

First, he said, patients should be well aware that they are being filmed. Installing surveillance cameras in conspicuous areas and posting signs about their presence should indicate to patients that they are being watched. Going a step further, doctors should ask patients to sign consent forms, which would provide additional assurance that the patients know and understand that surveillance cameras are recording.

Additionally, the location of the cameras matters, too. “The camera can be installed in a waiting room, focused on a counter, for example, where doctors leave supplies and things of that nature,” he said. “Perhaps they have hypodermic needles – the camera should be focused strictly on that, not any area where a patient would be treated.”

Above all, Kirschenbaum said, to diminish the probably of legal problems resulting from surveillance, be careful with the footage once it’s been captured.

“The greatest risk (of legal action) in any CCTV situation or audio listening device situation is really the misuse of the data once it’s collected,” Kirschenbaum said, “because even data that is viewed and collected illegally, if no none knows about it, there’s not going to be any (legal) issues.”

About the Author

Laura Williams is content development editor for Security Products magazine.

Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3

  • SecureAuth

    SecureAuth

    The acceleration of digital transformation initiatives as a result of COVID-19 has created a lasting impact on how businesses empower their workforce and engage customers. 3

  • PDK IO Access Control Software

    PDK.IO Access Control Software

    ProdataKey now allows for "custom fields" within the interface of its pdk.io software. Custom fields increase PDK's solutions' overall functionality by allowing administrators to include a wide range of pertinent data associated with each user. 3