One in Three U.S. Hospitals Report Rise in Violence and Assaults in 2014

One in three U.S. hospitals reported an increase in violence and assaults in 2014 despite widespread rising security budgets, according to a recent survey of 380 hospital administrators, chief security officers and staff by Guardian 8 Corporation, a wholly owned subsidiary of Guardian 8 Holdings. Top security concerns included the safety of patients and security officers as well as disruptions to patient care.

Reported increases in attacks and assaults included violence by patients and/or their families against emergency department personnel and staff such as nurses. Nearly half of respondents (46 percent) reported increasing their security budgets in 2014. The findings highlight the importance of proper security on hospital campuses and the need to address security staff turnover rates as high as 300 percent to 400 percent per year, according to Guardian 8, a provider of enhanced non-lethal (ENL) devices, such as the Pro V2, built for the security industry.

“No hospital facility can achieve its crucial mission of providing quality patient care without proper security to ensure patient, staff and visitor safety,” said Paul Hughes, chief operating officer of Guardian 8. “The inability to properly address a violent situation does not just affect the morale of security personnel, but also of the doctors and nurses around them. Low morale makes recruiting and retention a serious issue across the board. Minimizing security officer turnover therefore needs to be an integral part of a hospital’s overall security solution.”

An Equipment Issue

Guardian 8 maintains the excessive turnover in the hospital security industry is more an equipment issue than a matter of pay. When security officers feel safe, properly equipped and well prepared, they are less likely to leave—taking their first-hand knowledge of a hospital’s facilities, risks and protocols with them.

Hughes urged hospital security directors to recommend to administrators the smartest, safest security solutions. Exacerbating high security staff turnover, violent incidents lead to injuries and lost workdays. Add to that the high cost of replacing staff, estimated at 25 percent to 200 percent of the employee’s annual salary to cover the costs of advertising, interviewing, background checks, hiring and training.

According to the survey, 59 percent of respondents reported being unfamiliar with laws in their state restricting the use of non-lethal weapons. So if hospital administrators deny a request for security equipment for regulatory reasons, Hughes urged security directors to ask for the code or regulation in question.

Other survey highlights include the following:

  • Respondents’ top security concerns: patient safety (57 percent), officer safety (56 percent), disruptions to patient care (24 percent);
  • Response options: 15 percent of hospital security personnel are unarmed; 28 percent are armed; 57 percent use intermediate, non-lethal devices;
  • Variety of equipment carried by hospital security personnel: pepper spray, 41 percent; two-way communication system, 40 percent; baton, 37 percent; stun gun, 28 percent; on security officer video, 26 percent;
  • Seventy percent of respondents use an incident reporting system that includes a dashboard of activities for review; and
  • Fifty-one percent of respondents said they would feel comfortable moving away from their current security options.

Methodology

To understand recent trends in hospital violence and assault, and gauge top concerns and response options, Guardian 8 fielded an online survey of 380 hospital administrators, chief security officers, and nurses and hospital staff across the nation from Dec. 5, 2014 – Jan. 21, 2015.

Featured

  • Until We Meet Again

    A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

    • ISC West
  • Cyber Hygiene: What it Looks Like for IoT Devices

    Cyber Hygiene: What it Looks Like for IoT Devices

    For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

  • ISC West Announces 2023 Keynote Series Speaker Lineup

    The International Security Conference (ISC), in collaboration with premier sponsor Security Industry Association (SIA), announced five of this year’s ISC West Keynote Series speakers. ISC West will kick off its annual conference on March 28 (SIA Education@ISC: March 28-30 | Exhibit Hall: March 29-31) at the Venetian Expo in Las Vegas, Nevada. Read Now

    • ISC West
  • Accelerating Security Modernization

    In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes. Read Now

Featured Cybersecurity

New Products

  • Camden Door Controls CV-603 2 Door Bluetooth Access Control System

    Camden Door Controls CV-603 2 Door Bluetooth Access Control System

    his app-based system is designed to provide ‘best in class’ security of doors and gates, with up to 2,000 users. The intuitive programming app is Apple® and Android® compatible, with easy to use system set-up, user administration, downloadable audit trail and data back-up. 3

  • ABLOY IP54-rated Integrated Dust Cover

    ABLOY IP54-rated Integrated Dust Cover

    One of the things that keep security managers on high alert is the real possibility the security locks used to safeguard their properties may unexpectedly fail due to environmental conditions. 3

  • Genetec Security Center

    Genetec Security Center

    This major new release allows more system components to run in the cloud, reducing the gap between cloud and on-premises security systems. It also makes it easier to connect external systems and tap external data for use in dashboards, maps and investigations without relying on complex, specialized integrations. 3