Skip to main content

All Access Subscription

Get unlimited access to our full publication and article library.

Get Access Now

Interested in Group Sales? Learn more

Articles Tagged With: security

  • HHS Issues HIPAA Best Practices for Telehealth

    The Department of Health and Human Services published a resource guide to assist telehealth providers in explaining the privacy and security risks to patients, but the guidance makes clear HIPAA does not require this education. However, the goal is for the resource guide to help providers who would like to discuss potential risks with the patient.

  • ACEP Survey: Emergency Departments Under Siege

    In a recent survey, two-thirds of emergency physicians reported a patient assaulted them in the past year, and more than one-third of respondents said they have been attacked more than once. The survey by ACEP revealed 31% of assaults involved a family member or friend of the patient.

  • The Case for a Team Approach to Manage Agitated Patients

    While many EDs have instituted mechanisms to quickly trigger security staff, a Connecticut hospital created a unique team-based protocol that includes security and clinicians. Everyone works together to protect staff and prevent the need for restraints, sedatives, or other potentially harmful interventions. After three years, staff report they feel safer, and new data show the approach is associated with a lower rate of physical restraint use.

  • The Case for a Team Approach to Manage Agitated Patients

    While many EDs have instituted mechanisms to quickly trigger security staff, a Connecticut hospital created a unique team-based protocol that includes security and clinicians. Everyone works together to protect staff and prevent the need for restraints, sedatives, or other potentially harmful interventions. After three years, staff report they feel safer, and new data show the approach is associated with a lower rate of physical restraint use.

  • Legalities if Law Enforcement Responds to ED Violence

    The presence of law enforcement can agitate some patients, or cause others to withhold information over fears the information will be disclosed to police. It creates a situation where state or federal privacy laws can be violated. Emergency clinicians should consult hospital security, risk management, legal counsel, or leadership for guidance on policies and applicable laws.

  • Pandemic Violence: HCWs Report Patients Spitting, Coughing on Them

    Violent incidents have increased in healthcare facilities since the beginning of the pandemic. Among 833 study respondents, those with the highest rates of physical assault in the prior six months were ED security staff, nurses, and clinicians.
  • ED Violence Means Possible Liability Exposure for Hospital

    During litigation, two important questions will arise: How did the hospital keep the patient safe? Was the hospital not doing reasonable things that other hospitals were doing?
  • Hospital Security Must Work Closely with Risk Management

    Risk managers should work closely with hospital security directors to coordinate efforts to address workplace violence and other threats. Hospitals must balance security with welcoming the public and providing a pleasant atmosphere.
  • Take Steps to Prevent Damaging Security Breaches in Survey Studies

    IRBs can help investigators create a plan to prevent survey security breaches that can lead to false data and study slowdowns and shutdowns. IRBs should ensure researchers know that if they detect a breach that changes/corrupts data, leads to someone outside the research team accessing data, causes potential harm to participants, or requires a change in procedures or informed consent, it should be reported to the IRB.

  • IRBs, Researchers Starting to Recognize Security Breaches of Online Survey Data

    Researchers at the University of Houston discovered a survey study had been breached. Large number of surveys poured in, with batches arriving in two-minute intervals. Other signs of a breach included suspicious responses, unusual email addresses and patterns, responses from outside the United States, and missing contact information.