Jul,19

AS 4485.2 pdf download

AS 4485.2 pdf download

AS 4485.2 pdf download.Security for healthcare facilities
3.4 Assessment of threats
3.4.1 Non-deliberate threats Not all risks which could impact on security will be deliberate or have a criminal connection. Human error, natural hazards outside of the facility’s control and equipment failure are some examples of non- deliberate risks which could impact on the security of a facility. Such matters need to be considered during the risk assessment process. Particular consideration should be given to patients who are a risk to themselves and/or others. Security risk management and related business continuity planning (BCP) should fully consider the possible impact on security operations and the control of security risks during major natural disruptions, e.g. flooding from heavy storms. The BCP should consider the relevant risks, e.g. the loss of technical service support from contractors during such circumstances. 3.4.2 Criminal risks Many threats will involve some form of criminal or ilegal activity, such as burglary, theft, vandalism, molestation, violence or misuse of assets or information. The source of such risks could be from within (“insider threat”) or external to the facility. The reasons for such individuals or groups posing a threat will be varied, but could include: a Theft (facility or personal property). (b) Targeted assault. [C) Abduction. (d) Arson. [e} Any person who targets a healthcare facility or individual with criminal intent. [f) People looking to illegally acquire personal information about patients or workers, or information concerning the management or operations of a facility. 3.4.3 Sources of information Information relevant to assessing risks can be gathered from a wide variety of sources including, for example, incident reports, the facility’s workers, contractors providing security services. Police services are usually able to advise on the nature and level of criminal activity occurring in a particular location. Past experience, liaison with similar facilities and security-related issues raised in safety committee meetings are other examples of information sources. Sharing of information between departments within the facility is important to ensure important information is received in a timely manner to allow for appropriate management from a security perspective. Care should be taken to ensure that potential threats are not dismissed without proper inquiries, or any risk underestimated.
3.5 Risk assessment
AS ISO 31000 is the essential source to develop an accurate and comprehensive picture of security risks at a facility, and to identify and implement strategies and measures to ensure reasoned and sustainable risk management. To complete an accurate risk assessment at a facility, the potential consequences or outcomes and the likelihood of security risk events occurring needs to be determined in consultation with all key stakeholders. Security risks that relate to the potential consequences or adverse outcomes to a range of risk groups include the following: a People – workers, patients, visitors and vendors. (b) Property and assets. [c Provision of services. [d) Essential services (e.g electricity, communications, water). [e Information. [F) Pharmaceuticals. (g) Food. (h) Public confidence and facility reputation. The likelihood of security risk events occurring may be affected by a variety of internal and external facility specific factors including the following: (i) Facility design. (ii) Security operations implemented i.e. security officer resourcing, security patrols, response to alarm activations and security incidents. (iii) Level of competency and knowledge of workers regarding security management. (iv) Policies and procedures implemented i.e. safe work methods statement (SWMS), or equivalent, which provides full appreciation of hazards and risks associated with the roles and duties of the workers under the engagement. (W) Services provided and the manner by which these are provided i.e. patients under escort, for example by corrective services officers, immigration officers. (vi) Aggression by patients and relatives. (vi) Assault of workers outside of buildings (e.g. leaving work at night). (vii) Robbery of drugs and/or cash (e.g. facility cafe, automated teller machine [ATM) located on-site) etc. Consideration should also be given to identifying and addressing vulnerabilities.

Download
The previous

AS 4485.1 pdf download

The next

AS 4685.6 pdf download

Related Standards