Standard
Track updates
iconCreated with Sketch.

AS 4485.2:2021

[Current]

Security for healthcare facilities, Part 2: Procedures guide

Provides guidance and explanatory material which will assist with the implementation of the requirements of AS 4485.1. Designed to assist in the development of effective security systems throughout all healthcare facilities.
Published: 28/05/2021
Pages: 67
Table of contents
Cited references
Content history
Table of contents
Header
About this publication
Preface
1 Scope and general
1.1 Scope
1.2 Normative references
1.3 Terms and definitions
2 Policies and procedures
2.1 Governance
2.2 Security administrator
2.2.1 Formal delegation
2.2.2 Role and responsibilities
2.2.3 Policy coordination
2.2.4 Other sources of expert advice
2.3 Other organizations
3 Security risk assessment
3.1 Risk management
3.2 Important assets and property
3.3 Information
3.4 Assessment of threats
3.4.1 Non-deliberate threats
3.4.2 Criminal risks
3.4.3 Sources of information
3.5 Risk assessment
3.6 Vulnerability analysis
3.6.1 Factors affecting vulnerability
3.6.2 Actions to reduce vulnerabilities
4 Physical security
4.1 General
4.2 Design and construction
4.2.1 Introduction
4.2.2 Crime prevention through environmental design
4.2.2.1 Overview
4.2.2.2 Other considerations
4.2.2.3 Landscaping
4.2.2.4 Lighting
4.2.2.5 Signage
4.2.3 Utilities and critical infrastructure
4.2.4 Barrier protection
4.2.5 Doors and windows
4.2.6 Restricted areas
4.2.6.1 General
4.2.6.2 Features of restricted areas
4.2.6.3 Intruder and burglar resistant areas
4.2.7 Uninterrupted power supply (UPS)
4.2.8 Helicopter landing site (HLS)
4.2.9 Design of worker accommodation
4.3 Facility security
4.3.1 Security equipment
4.3.2 Engineering equipment
4.3.3 Equipment security and asset control
4.3.4 Car park security and control
4.3.5 Emergency and retrieval vehicle and aircraft security
4.3.6 Secure storage
4.3.6.1 General
4.3.6.2 Security containers and secure areas
4.3.6.3 Protection against forced attack
4.3.7 Property
4.3.7.1 Patient property security
4.3.7.2 Property on loan or in transit
4.3.7.3 Lost and found property
4.3.8 Intruder alarm systems
4.3.9 Video surveillance
4.3.10 Duress alarms
4.3.11 Access control
4.3.11.1 General
4.3.11.2 Level of access control
4.3.11.3 Alternative entries
4.3.11.4 Methods
4.3.11.5 Reasons to grant means of entry/exit
4.3.11.6 Suitability
4.3.12 Locks
4.3.13 Combination locks
4.3.13.1 General
4.3.13.2 Setting the lock
4.3.14 Keys
4.3.14.1 General
4.3.14.2 Key management
4.3.14.3 Key issue registers
4.3.14.4 Key issue authorization
4.3.14.5 Departmental keys
4.3.14.6 Keys for cleaning and maintenance workers
4.3.14.7 Key issue — Long term
4.3.14.8 Arrangements for the safe custody of keys to special stores
4.3.14.9 Controlling the ordering of duplicate keys
4.3.15 Passes or identity cards
4.3.15.1 General
4.3.15.2 Pass configuration
4.3.15.3 Receipt and conditions
4.3.15.4 Colour coding
4.3.15.5 Compromise
4.3.15.6 Wearing of passes
4.3.15.7 Security of pass production equipment
4.3.16 Visitor identification
4.3.16.1 General
4.3.16.2 Register
4.3.16.3 Visitor’s pass
4.3.16.4 Supervision of visitors
4.3.16.5 Accountability
4.3.17 Weapons and other dangerous items
4.3.18 Storage and disposal of hazardous substances
4.3.19 Disposal of clinical waste
4.3.20 Drug theft and diversion prevention
4.3.21 Valuable collectables
4.3.22 Close of business
4.3.23 Protocols for after-hours safety
4.4 Patient security
4.4.1 Missing patients
4.4.2 Restrictive interventions
4.4.3 Special considerations for patients with protective status (other than persons in custody)
4.4.3.1 General
4.4.3.2 Accommodation for patients with protective status
4.4.4 Security of persons in custody
4.4.4.1 General
4.4.4.2 Designated safe rooms
5 Security officers
5.1 General
5.2 Security services
5.3 Tasks and functions
5.4 Selection and vetting
5.5 Uniform, dress and bearing
5.6 Equipment
5.7 Proprietary versus contract services
5.8 Licensing
6 Security and safety of people
6.1 Introduction
6.2 Application
6.3 Nature of risks
6.4 Risks to people
6.5 Responsibility of people
6.6 Special considerations
6.6.1 General
6.6.2 Wards
6.6.3 Emergency departments and urgent care
6.6.4 Mental healthcare facilities
6.6.5 Public interface areas
6.6.6 Operating room security
6.6.7 Home visits
6.6.8 Movement of workers and others at night
6.6.9 Isolated work areas
6.6.10 Worker accommodation
6.6.10.1 Policy and procedures
6.6.11 Mortuary
6.6.12 Research, pathology and radiology laboratories
6.6.13 Storage and transport of cash
6.6.14 Family planning facilities
6.6.15 Terrorism
6.7 Risk reduction
6.7.1 General
6.7.2 Personal security precautions in the workplace
6.7.3 Commuting
6.7.4 Social media
7 Security screening of workers and vendors
7.1 Introduction
7.2 Worker probity
7.3 Responsibility
8 Incident procedures
8.1 General
8.2 Preservation of crime scene evidence
8.3 Reporting and investigation
8.3.1 Reporting
8.3.2 Investigation
8.3.3 Criminal proceedings
8.4 Post-incident management
8.4.1 General
8.4.2 Choice of people to provide support
8.4.3 Post-incident management
8.4.4 Supervisor’s role
8.4.5 Post-trauma
8.4.6 Critical incidents and psychological debriefing
8.4.7 Post-incident operational debriefing
8.4.8 Counselling and psychological support
8.5 Minimizing the possibility of recurrence
9 Newborn and paediatric security
9.1 General
9.1.1 General
9.1.2 Healthcare facilities
9.1.3 Security for newborns and paediatrics
9.1.4 Physical security
9.1.5 Parents, family or guardians’ involvement in security measures
9.2 Assumption of care
9.2.1 General
9.2.2 Response to a possible abduction
9.3 Media strategies
9.4 Paediatric security
9.5 Adolescent security
9.6 Country and stand-alone maternity services
9.7 Child-minding services
9.8 Delivery suite
10 Pharmacy and pharmaceuticals security
10.1 General
10.2 Application
10.2.1 General
10.2.2 Responsibility
10.3 Policies and procedures
10.4 Facilities and equipment
10.4.1 General
10.4.2 Design of storage areas
10.4.3 Designated secure areas
10.4.4 Facilities and equipment
10.4.5 Holding areas
10.5 Pharmacy computer systems
10.6 Purchasing of pharmaceuticals
10.6.1 General
10.6.2 Valid orders
10.7 Receiving of pharmaceuticals (stock)
10.8 Storage of pharmaceuticals
10.9 Internal distribution of pharmaceuticals
10.9.1 General
10.9.2 Distribution
11 Education, induction and training
11.1 Healthcare security officers
11.1.1 Training
11.1.2 Additional competencies for supervisors
11.1.3 Custodial and escort officers
11.2 Workers other than healthcare security officers
11.2.1 Training considerations
11.2.1.1 General
11.2.1.2 Violence prevention and management training
11.2.1.3 Aggression indicators
11.2.2 Evaluation of security-related education and training activities
12 Security for services provided outside of the healthcare facility
12.1 Introduction
12.2 Application
12.3 General procedures for home visits
12.3.1 Risk assessment
12.3.2 Security risks to be considered
12.3.3 Potential risk controls
12.3.4 Alternative arrangements
12.3.5 Home visiting procedures
12.3.6 Vehicle breakdown
13 Geographically remote or higher environmental risk healthcare facilities
13.1 General
13.2 Recruitment briefing
13.3 Security provisions
13.3.1 General
13.3.2 Remote area worker accommodation
13.3.3 Lighting
13.3.4 Doors and windows
13.3.5 Fencing
13.3.6 Suitable vehicle
13.3.7 Garaging and storage
13.3.8 Communications
13.3.9 Fire protection
13.3.10 Security awareness training
13.3.11 Emergency management plans
13.4 Security policies
Bibliography
Cited references in this standard
Content history
[Superseded]
DR AS 4485.2:2020
$193.66
AUD
Inclusive of GST
Available formats
iconCreated with Sketch.
Available formats
icon_export/16/closeCreated with Sketch.
Web Reader
Instantly view standards in your browser. Search, bookmark, highlight, and comment for anytime access - online and offline.
Web Reader (PDF)
View standards in PDF format in your browser. Search, bookmark, highlight, and comment for anytime access - online and offline.
Web Reader
Licence:
1 user
Total
$193.66
Add to cart
visa logo
mastercard logo
amex logo