Hospitals Meet Security Challenges With Integrated Solutions

Size: px
Start display at page:

Download "Hospitals Meet Security Challenges With Integrated Solutions"

Transcription

1 Hospitals Meet Security Challenges With Integrated Solutions Providing security for hospitals involves more than the best choice of products and features it also requires best practices. Learn how security systems such as access control, intrusion detection, and digital video surveillance can be integrated into a building automation system to protect patients, staff, property, and information. October 2008 / White Paper Make the most of your energy

2 Summary I. Executive Summary... 3 II. Healthcare Security Issues Today... 4 The Challenge of the Bottom Line... 5 III. Moving Beyond Basic Security Technology... 6 Intrusion Detection... 6 Access Control... 6 Video Surveillance Technologies... 7 Video Analytics Help Spot Incidents... 8 Integrating Intrusion Detection, Access Control, and Video Surveillance... 9 IV. Benefits of Integration...10 Integrated Security Better Protects Infants...10 Control in the Event of an Emergency...11 V. Examples of TAC Customer Solutions...12 University of Chicago Hospitals...12 Moffit Cancer Center...12 VI. Conclusion...13

3 I. Executive Summary Security and safety at healthcare facilities are important for both quality healthcare and public safety. Hospitals and clinics are a safe haven for those in physical or emotional need, and increasingly seen as a place of refuge in the event of a large-scale emergency such as a natural disaster or terrorist attack. For these reasons and others, more and more people use hospitals as their first source for help. Hence, it is essential that healthcare security staff not only consider facility security and safety, but also take an interest in broader public safety. By applying best practices there are many technologies that can aid a welltrained healthcare security staff in preventing crime and managing security incidents. The key systems of security are intrusion detection, access control, emergency communications, and video surveillance. If each of these systems is purchased separately, administration and training can burden a company or property owner. Intrusion alarms occur on one system, access badges are administered in a stand-alone database, and intelligent digital video technology runs on dedicated computer equipment. Each system requires service, maintenance, administration, and training. By integrating these separate security systems under a flexible building automation system (BAS), hospital executives realize a lower upfront investment for a considerably more powerful security solution. Installation and training occur on a single system. Operational costs like administration and maintenance are also reduced. Component devices are used in multiple ways to trigger lighting, video capture, pan-tilt-zoom, higher video resolution or frame rate, door locks, and other aspects of building control. A single system enables greater flexibility to add security components that can be easily integrated into the overall system, keeping the cost of capital expenditures low, and requiring little additional training. An independent study by Strategic ICT Consulting of a 145,000 square foot building shows a system installation cost saving of 24% for an integrated BAS versus separate systems. And after installation, operations and life-cycle savings continue. Project analysis by Teng & Associates shows that training is reduced 33%, IT administration is reduced 82%, and the cost for changes, upgrades, and additions to an integrated system are reduced by 32%. These operational figures are based on experience and measurement, and clearly demonstrate the value of an integrated BAS. Finally, this paper will show several examples where TAC has effectively applied building automation products and related services to provide effective integrated security for its customers. Hospitals Meet Security Challenges with Integrated Solutions 3

4 II. Healthcare Security Issues Today Hospital security departments and staff are especially challenged to provide safe environments for employees, patients and visitors. Hospitals, by their nature, are designed to be open and accessible to the public, which means street crime and other dangers can easily enter through hospital doors if not properly protected. A Justice Department study reveals that hospital emergency departments across the country treat more than 1.3 million people a year for injuries caused by violent attacks, which can escalate and continue within the hospital itself after the initial incident. According to Bureau of Labor Statistics data for 1993, workers in the health care field experienced the highest incidence of assault injuries. One study found that 82 percent of nurses surveyed had been assaulted on the job, 56 percent had been assaulted in the year prior to the survey, and many assaults go unreported 1. The same study shows that the greatest number of assaults (25%) occurred in emergency departments. Medical equipment, supplies, and controlled substances can also be targets of theft; and hospital patients, visitors, and staff can become victims of purse snatchings and muggings. Large, urban hospitals often serve as many as 1,000 visitors in a single day, in addition to hundreds of patients. This all adds to the ongoing staffing issues facing so many of our hospitals today. A survey conducted by the American Society for Industrial Security (ASIS) determined that effective security has become a part of the everyday operations of many healthcare organizations, regardless of size, location, or type of hospital. Security issues and concerns are identified and addressed daily by senior and middle management. Top-ranked security concerns are shown below. Security and Safety Areas Ranked for Priorities Greatest Risk of Crime 1. Patients 1. Infant Units 2. Employees 2. Pediatric Units 3. Visitors 3. Pharmacy 4. Vendors 4. Psychiatric Units 1 Erickson and Williams-Evans study, 2000 Hospitals Meet Security Challenges with Integrated Solutions 4

5 The challenge of the bottom line Even as administrators are actively addressing safety issues, hospital executives are challenged by stringent budget demands where shrinking margins can impact investment in security technology (see Figure 1). Hospitals must serve the uninsured public and spend money implementing systems and procedures that allow them to conform to government regulations, such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the requirements of The Joint Commission on Accreditation of Healthcare Organizations (JCAHO) and Centers for Medicare and Medicaid Services (CMS). In a competitive market, hospitals also face the private healthcare practices of nearby clinics and independent doctor consortiums, which can siphon away high-margin services such as minor surgeries, ultrasound, MRI and CT scan, and recruit staff to a more secure and safe environment. And on the revenue side there is additional pressure from the Diagnosis Related Group (DRG) reimbursement schedule, which regulates how healthcare providers can charge for services. In this financial environment, it is essential that healthcare institutions seek to proactively and continually reduce operating costs and limit liabilities. Many hospitals are turning to technology to help make the security programs more productive and effective. New integrated solutions for security, facility and data management enable healthcare institutions to both reduce costs and improve the safety at their facilities. Figure 1: Total, Operating, and Patient Care Margins 1997 (pre-balance Budget Act) vs Hospitals Meet Security Challenges with Integrated Solutions 5

6 III. Moving Beyond Basic Security Technology Regardless of the size of the healthcare facility, its location or the level of security risks that need to be addressed, there are essential components of an electronic security system. These include intrusion detection, access control and visitor management system, and video surveillance. These three systems, in the hands of competent and capable security staff, apply technology effectively to reduce crime and protect people and property. We will examine each system individually, and then in combinations to demonstrate how integrating security into the building automation system leverages these systems in multiple ways, increasing security and reducing operating and training costs. Intrusion detection Simple intrusion detection is probably the most familiar concept of security to most people. Intrusion detection involves the use of door or window contacts, glass contacts, or motion sensors, in combination with some type of audible alarm that sounds when a person has forced entry into a building or room. An alert is sent to the police or security station to notify authorities of the time and location of the incident. Security officers respond in person to evaluate the situation. This method of incident response can be adequate for detecting an event and quickly getting to the scene. But the effectiveness of the response at the scene and subsequent prosecution is dependent on several things: the proximity of security personnel to the incident; whether witnesses were present; the number of people involved; the seriousness of the incident, and other factors. Furthermore, with simple intrusion detection, there is little in place that would deter people from committing a crime in the first place. More information would be helpful, such as captured details of the situation that could lead to proper response and identification of perpetrators, thereby reducing the likelihood that a similar incident would occur again. Door and window contacts, motion sensors, and other devices already in use for alarming can be put to better use to help gather this information by triggering other parts of an integrated security system. Access control Access control is the means by which people are granted or denied access to restricted areas, such as clinics, operating rooms, labs, and parking garages. One of the largest security challenges hospitals face is how to secure a space that is intended to be not only a public environment, but also an inviting one. This means that a balance between permissiveness and control is needed, not just using technology, but as part of the healthcare facility s culture of security. For example, a hospital may have a sophisticated access control system with picture badges issued to every employee, and card readers, electrified locks, and cameras protecting every door. But a courteous employee can defeat all of these security measures by holding a door open for a tailgating perpetrator. A good access control system can detect this, and issue an alarm to the security staff when it happens. Access control could be used to manage non employees both vendors and visitors using a visitor management system. It can also assist with after hours access to areas of the hospital restricting and controlling certain egresses. Also, a single card could be used both for access to the parking garages and hospitals, making it easier of the staff and physicians. With public, patient and staff needs in mind, how does management begin to evaluate the many types of access control systems that are available? Furthermore, in a growing and changing healthcare environment, what is the best kind of access control to meet future needs? When used as a stand-alone system, card readers and other electronic access devices offer Hospitals Meet Security Challenges with Integrated Solutions 6

7 a cost-effective and flexible way for a hospital to control who has access to the various parts of the building, with the system recording who has gone where, and when. The sequence of operations is for the access device to trigger the door lock, entry is granted, and the event is recorded by the central system. But if a device can trigger the lock, why not use this inherent ability to trigger other security devices as well? As a stand-alone system, access control does its job, but does not fully leverage the connected sensors for broader security objectives. Video surveillance technologies Video surveillance has evolved significantly in the last several years. Older video systems needed banks of video tape for continuous recording, and required manual administration to swap tapes periodically during the day. Record keeping was prone to errors and finding specific incidents on tape was time-consuming. Digital Video Recorders (DVRs) made significant advances in features and functions, taking advantage of fast computer processors and high density storage media to digitize, compress and record video from analog cameras. Newer cameras today have embedded processors that enable video to be compressed within the device and transmitted real-time over IP networks to Network Video Recorders (NVRs) that centrally manage video feeds from many IP cameras. DVRs and NVRs have many advantages over older analog recording technology. Streaming video can be continuously recorded and discarded in cycles of days, weeks, or months if no security incidents occur. If an incident does occur, disk indexing and time-stamping make it simple to find video from a given date and time. In addition, because the video tures ay. tem is d A major university of medicine on the U.S. east coast has increased expenditures for security from a $100,000 investment in 1993 to more than $2 million today. One reason for the increase is that the university has upgraded its CCTV system to digital video recorders with Ethernet capability and added 75 cameras. This enabled the security staff to record, monitor and view surveillance activity simultaneously with digital day/night pan-tilt-zoom cameras stationed throughout the university s campuses spread across five cities. The integrated surveillance and access-control systems allow officials to call up instant live video and recordings of alarm conditions and system activity. Using a single system that ties all of its properties together, the university has improved security while still making its campuses accessible to the more than 18,000 students, researchers, teachers, patients and employees. system that ties all of g its campuses s and employees. Streaming video can be ecurity incidents occur. If an o from a given date and time. or backed up on CD, widely available. price-competitive market. de, a DVR or NVR may be Hospitals Meet Security Challenges with Integrated Solutions 7

8 Video Analytics is digitized, software it can be exported is easy to and use distributed and via owing functionality. or backed For up on example, CD, DVD, it or can other be digital med to media look for using specifically common computer defined backup anomalies. programs It be programmed that are widely to available. give special attention to elements in a video frame such as a computer, filing cabinet. Digital video surveillance is cost-effective and sold by many vendors in a highly price-competitive ore, Video market. Analytics If purchased can as be a integrated separate system with to curity and meet information the needs of systems a security plan to create or upgrade, new ties for a using DVR or and NVR managing may be adequate video data. for immediate surveillance objectives. But if this digital video recorder is integrated with an organization s access control and intrusion detection system (as part of the broader building automation system), the user improves surveillance and reduces the need for additional security personnel. Integrated with access control, video verification, for example, allows a user to see live video as well as the cardholder s picture when a given access card is presented at a reader. The security staff can verify that the person presenting the badge is the actual cardholder. Another example of video verification effectiveness occurs in identifying individuals who are tailgating as noted earlier, when one person swipes their badge and gains access to the facility and another person follows them in without presenting their badge. The integrated system allows organizations to visually identify, verify and capture security breaches at access points. Video analytics help spot incidents The advent of video analytics brings additional flexibility and increased productivity of security staff that monitor many cameras or for a non-manned time it can send out alerts to other staff members using mobile devices to respond where needed. Video analytics is a technology applied in software that examines the video camera s field of view for patterns of movement that match real-life events, such as falling, fence climbing, lurking, and trip- Video Analytics software tracks people and objects, and lines. can Video send analytics alarms when provides suspicious a means activities by which occur. the user can focus only on what is truly important, managing surveillance by exception events rather than trying to observe all events. A DVR or NVR can be configured to only display a camera s video if a specific event or alarm occurs. At a hospital for example, foot traffic in the evening past a closed pharmacy may be considered normal. But lurking near the pharmacy door may be an indication that a break-in is about to happen. Video analytics can tell the difference. And additional alarms can be generated if video analytics detect more people in the video frame, which may indicate another level of security threat is occurring. Another example of applied video analytics is a fence climbing alarm. Security staff may know that it is common for people to walk along the outside of a fence, horizontally across the field of view. They are not interested in this, as it poses no threat. Yet if someone were to begin to climb the fence, vertical motion across the field of view would trigger an alarm and transfer video to the security user s alert workstation. These are examples of how expanded use of video surveillance technology can increase security at healthcare facilities without requiring an increase in security personnel. Video analytics software tracks people or objects, and can alarm on types of behavior 3 DEO ANALYTICS AND SECURITY: USING DATA TO IMPROVE SAFETY AND ROI Hospitals Meet Security Challenges with Integrated Solutions 8

9 Integrating intrusion detection, access control, and video surveillance Today s access control and video surveillance systems can work together in an integrated BAS to provide a holistic solution for healthcare organizations, keeping intruders out of secure areas, limiting access to infant and pediatric wards, and remotely monitoring critical areas to reduce the risk of crime and security incidents. This is why more and more hospitals are increasing their use of CCTV as part of their overall security plan. Using an integrated system, security staff at a central monitoring station can view live images from surveillance cameras, control pan-tilt-zoom cameras, or search for video clips stored on digital video recorders (DVRs). When an alarm is triggered by intrusion or an invalid access card, the BAS can command the DVR to begin recording, display live video from a linked camera at the location, map the alarm location, and send an to an administrator all at the same moment. CCTV cameras are an important surveillance component at vulnerable areas of a hospital, such as entrances, parking garages, pharmacies, and nurse stations. When a duress alarm is activated at one of these locations, cameras can be activated to survey the scene and monitor the emergency, and security personnel can quickly evaluate their response. Asset protection is also becoming a high priority for hospitals. The hospital needs to track everything from PCs to wheelchairs, to PDAs and phones not just for the value of the item but also for the data that could be located on it. They are more and more looking to RFID (Radio Frequency Identification) and tagging technologies to assist in this. This system works in conjunction with video and access control to document the movement of assets. Hospitals Meet Security Challenges with Integrated Solutions 9

10 egrating the Security System with the BAS IV. Benefits of Integration t interface enables one person to be trained on multiple become multi-use. A motion sensor can be used for lighting d hours, and intrusion detection during unoccupied hours. For hospital administrators and security staff, integrating various systems in the hospital offers numerous advantages. Foremost, integration provides for reduced installation and operating costs because it eliminates component redundancy and allows staff to streamline operations. Furthermore, it reduces training and empowers system operators by allowing them to perform their duties more efficiently. Integration can simplify the operation and control of complex hospital systems, while enhancing security at the same time. ity, efficiency, and economy provide room for additional integration at the lowest cost. cupant needs, offering patients and staff greater security and Benefits of Integrating the Security System with the BAS A site-wide single-seat interface enables one person to be trained on multiple security systems. to effective use, which gives hospital security staff solid r prosecution and proof of loss. CCTV records also aid law es in finding criminals. Security components become multi-use. A motion sensor can be used for lighting control during occupied hours, and intrusion detection during unoccupied hours. During design, flexibility, efficiency, and economy provide room for additional security expansion or integration at the lowest cost. Better response to occupant needs, offering patients and staff greater security and peace of mind., allowing the customer to choose among best-of-class More information put to effective use, which gives hospital security staff solid ground to stand on for prosecution and proof of loss. CCTV records also aid law enforcement authorities in finding criminals. Vendor independence, allowing the customer to choose among best-of-class security products. ibility, whereby one integrator is held accountable for the. Single-source responsibility, whereby one integrator is held accountable for the entire security system. Integrated security better protects infants Administrators at all hospitals are concerned about infant abductions, and securing infants is certainly a priority, both for safety and public relations reasons. All told, 123 newborns have been abducted from hospitals since Infant Tagging, as it is often called, is a high-tech infant protection program designed to prevent baby abductions from maternity units and nurseries. Typically, a small round button-like tag attached to a band is placed around an infant s ankle or wrist soon after birth. Each tag is actually a miniature RF device that works in conjunction with the access control system and automatic door locks. An alarm sounds when a tag approaches or goes through a door. An active monitoring system reports where the tag is at all times by sending a signal to the central monitoring center at the hospital. ROTECTS INFANTS rned about infant abductions, and oth for safety and public relations en abducted from hospitals since lled, is a high-tech infant baby abductions from maternity und button-like tag attached to a or wrist soon after birth. Each tag rks in conjunction with the or locks. An alarm sounds when a An active monitoring system sending a signal to the central With the system, the baby s parents or authorized hospital personnel can carry the baby freely throughout a designated area without generating an alarm. However, if an infant is brought near an exit door, or if the ankle band is tampered with, an alarm is generated and all doors leaving the Hospitals Meet Security Challenges with Integrated Solutions 10

11 th the system, the baby s parents or authorized hospital personnel can carry the baby freely throughout a signated area without generating an alarm. However, if an infant is brought near an exit door, or if the kle band is tampered with, an alarm is generated and all doors leaving the area are automatically locked (in ordination with fire safety). An integrated system can also link infant handling to access cardholders, tivate CCTV cameras, lock stairwell doors, and control elevators. Integrated systems will also immediately play the identification of the baby and a map locating the exit door through which the baby was taken. White Paper NTROL IN THE EVENT OF AN EMERGENCY a major area specialty are automatically hospital in locked the Northeastern (in coordination with ited States, fire safety). the BAS An integrated plays a key system role can in also the link ility s emergency infant handling shutdown to access procedure. cardholders, A activate plan was t in place CCTV to protect cameras, against lock stairwell a potential doors, and biological control ack. In elevators. the event Integrated of a bio-terrorist systems will incident, also immediately the S operator display will the press identification the emergency of the baby shutdown and a map tton on locating the workstation the exit door screen. through The which system the baby will mediately was signal taken. a critical alarm, page all intenance personnel, and shut down the hospital s handling Control systems and in outside the event air dampers. of These S measures ensure airborne agents are not spread an emergency ther throughout the building. At a major specialty hospital in the Northeastern Emergency rooms can be especially vulnerable, ergency United rooms States, can be the especially BAS plays a vulnerable, key role in the particularly at urban hospitals. Gang violence and domestic particularly at urban hospitals. Gang violence and nflicts are facility s among emergency the problems shutdown that procedure. may enter A plan the hospital along with a patient. This is why hospitals need domestic conflicts are among the problems that ability was to restrict put in place access to protect to the against emergency a potential department (ED). A lockdown keeps people in the ED from may enter the hospital along with a patient. This ther penetrating biological attack. the hospital, In the event while of a bio-terrorist lockout secures the ED entrance to keep threatening people from is why hospitals need the ability to restrict access tering. Cameras incident, the and BAS intercoms operator will can press be utilized the as well to keep security staff fully appraised of the situation to the emergency department (ED). A lockdown d ensure emergency best practices shutdown are button followed. on the workstation keeps people in the ED from further penetrating the screen. The system will immediately signal a critical hospital, while a lockout secures the ED entrance alarm, page all maintenance personnel, and shut to keep threatening people from entering. Cameras down the hospital s air handling Integration systems and Improves the Bottom Line and intercoms can be utilized as well to keep outside In air an dampers. independent These BAS case measures study involving ensure a $2,464,693 non-integrated BAS security staff fully appraised of the situation and airborne 145,313 agents are square-foot not spread building further throughout with 1,500 occupants, a research team examined the $1,868,166 integrated BAS ensure best practices are followed. the building. installation costs of the components of a $596,527 difference = savings non-integrated BAS versus that of an integrated BAS. As the results show, the cost-savings were significant over 24 percent. Integration Systems integrated: Improves the Bottom Line Findings also show that an integrated approach offers a broad In an independent Lighting case Controls study involving a 145,313 $2,464,693 non-integrated BAS square-foot range of commercial and technical Building office building Controls with 1,500 occupants, $1,868,166 integrated BAS a research benefits, including a single vendor team Security examined the installation costs of $596,527 difference = savings the components point of contact, efficient project Fire and of a non-integrated Life Safety BAS versus that of an management, easier equipment integrated Metering BAS. and Monitoring As the results show, the cost-savings were deployment and investment Systems integrated: Structured Cabling significant over 24 percent. Findings also show that protection an integrated for future approach upgrades. offers a broad range Lighting Controls Source: Building Strategic Controls ICT Consulting, April 2005 of commercial and technical benefits, including a single vendor point of contact, efficient project Security management, easier equipment deployment and Fire and Life Safety investment protection for future upgrades. Metering and Monitoring Structured Cabling Source: Strategic ICT Consulting, April 2005 SPITALS MEET SECURITY CHALLENGES WITH INTEGRATED SOLUTIONS 10 Hospitals Meet Security Challenges with Integrated Solutions 11

12 V. Examples of TAC Customer Solutions V. Examples of TAC Customer Solutions TAC provides comprehensive, effective, and Below are some examples of TAC s security innovative building automation solutions for solutions, and the benefits gained by the TAC provides comprehensive, effective, and innovative building automation solutions for hundreds of hundreds healthcare of healthcare facilities worldwide. property owner. V. Examples facilities of worldwide. TAC Customer Below are some Solutions examples of TAC s security solutions, and the benefits gained by the property owner. TAC provides comprehensive, effective, and innovative building automation solutions for hundreds of healthcare facilities worldwide. Below University are some of examples Chicago of Hospitals TAC s security solutions, and the benefits gained University of Chicago Hospitals by the property owner. University University of of Chicago Chicago Hospitals Hospitals is one is of one the of top the rated top healthcare rated healthcare institutions in institutions in the United States. With more than 1,000 beds, this the United States. With more than 1,000 beds, this academic medical center academic medical center admits approximately 31,000 patients admits approximately 31,000 University patients of Chicago from all parts Hospitals of the world and treats from all parts of the world and treats more than 500,000 outpatients more than 500,000 outpatients annually, including 80,000 emergency room annually, University including of Chicago 80,000 Hospitals emergency is one room of visits. the top Covering rated more healthcare than institutions in visits. Covering more than five city blocks, UCH employs over 4,700 employees. five the city United blocks, States. UCH employs With more over than 4,7001,000 employees. beds, Providing this academic a safe medical center environment Providing a for safe both environment staff and patients for both presents staff and a special patients security presents a special admits approximately 31,000 patients from all parts of the world and treats challenge security challenge for the Hospital s for the Security Hospital s Department. Security Department. more than 500,000 outpatients annually, including 80,000 emergency room visits. Covering more than five city blocks, UCH employs over 4,700 employees. At one time, UCH UCH had had six different six different security security vendors, vendors, a wide variety a wide of variety of security Providing a safe environment for both staff and patients presents a special security equipment, equipment, 26 different 26 different forms forms of authorized of IDs, IDs, and and had no centralized security security challenge for the Hospital s Security Department. centralized control. A security control. solution A security from TAC solution provides from an TAC innovative provides an approach to total innovative security integration. approach to total The system security integration. controls access The system to over controls 640 doors and to the At one time, UCH had six different security vendors, a wide variety of security access parking to garage, over 640 providing doors and to full the integration parking garage, with providing the hospital s full HVAC, lighting, equipment, 26 different forms of authorized IDs, and had no centralized security integration CCTV, paging, with the intercom, hospital s critical HVAC, life lighting, point CCTV, monitoring, paging, intercom, fire alarms, elevators, e- critical control. mail, and life A point security infant monitoring, solution tagging systems. fire from alarms, TAC The elevators, provides TAC system , an innovative and also infant approach to total handles more than 715 tagging security unique systems. integration. alarms and The 233 TAC The system system unique also controls system handles access schedules, more than to over stores 715 unique 640 doors and to the more than 24,000 alarms parking personnel and garage, 233 records, unique providing and system full processes schedules, integration approximately stores with more the than hospital s 130,000 24,000 HVAC, lighting, transactions per day. personnel CCTV, paging, records, intercom, and processes critical approximately life point monitoring, 130,000 transactions fire alarms, elevators, e- per mail, Patients day. and infant tagging systems. The TAC system also handles more than 715 and employees alike can rest assured they will be secure when they unique alarms and 233 unique system schedules, stores more than 24,000 Patients come through and employees the doors alike at can UCH, rest a assured hospital they on will the be forefront secure when of medicine and personnel records, and processes approximately 130,000 transactions per day. they leading come the through way in the security doors at technology. UCH, a hospital on the forefront of medicine Patients and leading employees the way alike in security can rest technology. assured they will be secure when they come through the doors at UCH, a hospital on the forefront of medicine and leading the way in security technology. Moffitt Cancer Center Moffitt Cancer Center The Moffitt Cancer Center in Tampa is the only hospital in Florida designated by the National Cancer Institute Moffitt as a comprehensive Cancer Center cancer center. Moffitt has 162 The beds Moffitt and Cancer serves Center more than in Tampa 4,500 is the inpatients only hospital and in 100,000 Florida outpatients yearly. designated The Center s by the campus National contains Cancer nine Institute buildings, as a comprehensive including the Moffitt Research cancer The Moffitt center. Cancer Moffitt has Center 162 beds in Tampa and serves is the more only than hospital 4,500 in Florida designated by Center, a 101,352 square-foot facility dedicated to cancer research. inpatients the National and 100,000 Cancer Institute outpatients as yearly. a comprehensive The Center s cancer campus center. Moffitt has 162 contains beds and nine serves buildings, more including than 4,500 the Moffitt inpatients Research and Center, 100,000 a outpatients yearly. Exemplifying technology on the cutting edge, Moffitt Cancer Center chose a TAC 101,352 The Center s square-foot campus facility contains dedicated nine to buildings, cancer research. including the Moffitt Research facility management system to control and secure its facilities. The TAC system Center, a 101,352 square-foot facility dedicated to cancer research. at Moffitt provides not just HVAC control, but security management, fuel tank Exemplifying technology on the cutting edge, Moffitt Cancer Center chose monitoring, a TAC facility parking management control, and system integration to control with and a secure Digital its CCTV system. Exemplifying technology on the cutting edge, Moffitt Cancer Center chose a TAC facilities. facility management The TAC system system at Moffitt to provides control and not just secure HVAC its control, facilities. The TAC system but Currently, security management, 110 card readers fuel tank control monitoring, access parking into the control, Cancer and Center after hours at Moffitt provides not just HVAC control, but security management, fuel tank integration and high-security with a Digital areas CCTV 24/7. system. There are more than 200 digital CCTV cameras monitoring, parking control, and integration with a Digital CCTV system. throughout the facilities, including several in an 800-car parking garage. The Currently, Moffitt security 110 card staff readers is able control to monitor access into any the camera Cancer from Center any workstation on the Currently, 110 card readers control access into the Cancer Center after hours after Center s hours LAN. and in There high-security are currently areas 24/7. web There client are more viewing than stations 200 spread and in high-security areas 24/7. There are more than 200 digital CCTV cameras digital throughout CCTV cameras the buildings. throughout the facilities, including several throughout the facilities, including several in an 800-car parking garage. The in an 800-car parking garage. The Moffitt security staff is able to monitor Moffitt Administrators any security camera staff at from is Moffitt any able selected workstation to monitor the on any TAC the camera system Center s from to LAN. any manage There workstation on the their systems are Center s more currently LAN. efficiently 24 web There and client are utilize viewing currently their stations 24 web full-time spread client employees throughout viewing stations more the spread effectively. buildings. throughout the buildings. TAC allows them to do both. Administrators Moffitt at Moffitt selected selected the TAC the TAC system system to manage to manage their their systems systems more efficiently more efficiently and utilize and utilize their their full-time full-time employees more more effectively. effectively. TAC allows TAC them allows to them do both. to do both. 11 HOSPITALS MEET SECURITY CHALLENGES WITH INTEGRATED SOLUTIONS 11 HOSPITALS MEET SECURITY CHALLENGES WITH INTEGRATED SOLUTIONS Hospitals Meet Security Challenges with Integrated Solutions 12

13 VI. Conclusion Patients have high expectations for quality healthcare today. State-of-theart facilities, safety and security are of primary concern. In order to meet rising expectations within this cost-sensitive market, hospitals must invest wisely in their facilities as a strategic asset to serve patients, attract qualified doctors and nurses, and serve the greater public. Fortunately, new building management solutions are able to increase security at healthcare facilities while also maximizing energy efficiency and performance. This leads to a reduction in operating costs and enables resources saved to be reallocated within the budget to new programs for patient services. Technology must work effectively as a tool for well-trained security staff. When evaluating intrusion detection, card access control, and video surveillance systems, require that your vendors show how integration of these security functions can increase security and minimize the training and burden to security personnel. Ask that they show how integration with the facility s building automation system could provide further efficiencies of operations. Hospitals Meet Security Challenges with Integrated Solutions 13

14 Schneider Electric One High Street, North Andover, MA USA Telephone: Fax: All brand names, trademarks and registered trademarks are the property of their respective owners. Information contained within this document is subject to change without notice. On October 1st, 2009, TAC became the Buildings Business of its parent company Schneider Electric. This document reflects the visual identity of Schneider Electric, however there remains references to TAC as a corporate brand in the body copy. As each document is updated, the body copy will be changed to reflect appropriate corporate brand changes Schneider Electric. All rights reserved. WP-HC-SECURITY-A4.BU.N.EN CC October 2008 sm

Hospitals Meet Security Challenges With Integrated Solutions

Hospitals Meet Security Challenges With Integrated Solutions Healthcare Hospitals Meet Security Challenges With Integrated Solutions Providing security for hospitals involves more than the best choice of products and features it also requires best practices. Learn

More information

Integration: The Future of Commercial Office Building Security

Integration: The Future of Commercial Office Building Security Commercial Offices Integration: The Future of Commercial Office Building Security Providing security in commercial offices involves more than the best choice of products and features. Learn how security

More information

Creating Safe Campuses with Integrated Security Solutions

Creating Safe Campuses with Integrated Security Solutions Creating Safe Campuses with Integrated Security Solutions Providing security for colleges universities involves more than the best choice of products features. Learn how security systems such as access

More information

Hospitals Meet Security Challenges with Integrated Security and Facility Solutions

Hospitals Meet Security Challenges with Integrated Security and Facility Solutions Hospitals Meet Security Challenges with Integrated Security and Facility Solutions by Steve Nibbelink, CHPA January 2012 / White paper Make the most of your energy SM Summary Executive summary...3 Healthcare

More information

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility Trust your facilities to a leader in security systems The world is changing rapidly. Companies and government agencies

More information

Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution

Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution Chances are, you re not just responsible for making sure people get in and out of your facilities.

More information

Video Analytics and Security

Video Analytics and Security Video Analytics and Security Using video data to improve both safety and ROI March 2008 / White Paper Make the most of your energy Summary I. Executive Summary... 3 II. Captured on Video. Now What?...

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

Cisco Video Surveillance in Hospitals: Ten Ways to Save Money and Improve the Patient Experience

Cisco Video Surveillance in Hospitals: Ten Ways to Save Money and Improve the Patient Experience White Paper Cisco Video Surveillance in Hospitals: Ten Ways to Save Money and Improve the Patient Experience What You Will Learn Video surveillance in hospital settings can help provide high-quality, affordable

More information

Security Management Plan

Security Management Plan Effective Date: 03/2015 1 of 10 I. Table of Contents: I Table of Contents II Authority III Purpose & Scope IV Policy Statement V The Joint Commission Standards VI Performance Standards VII DUPD Services

More information

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco.

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco. Business Owner s Security Buyers Guide Everything you need to know before purchasing a security system Business Owners Security Buyer s Guide You re a business owner. That means you wear a lot of hats

More information

Infant & Pediatric Security Solutions

Infant & Pediatric Security Solutions Infant & Pediatric Security Solutions Keeping newborns and children safe is critical for parents, and a secure hospital elevates your reputation. Protect your patients, give families peace of mind, and

More information

Retail Solutions. Why Tyco Security Products for Retail?

Retail Solutions. Why Tyco Security Products for Retail? Retail Solutions Why Tyco Security Products for Retail? We are a leading provider of integrated retail security solutions, deployed today at more than 80 percent of the world s top 200 retailers. Tyco

More information

Remote Guarding. The traditional guarding functions that you depend on can now be performed remotely.

Remote Guarding. The traditional guarding functions that you depend on can now be performed remotely. Remote Guarding Remote Guarding The traditional guarding functions that you depend on can now be performed remotely. When you have Remote Guarding managed by Securitas USA, we act on incidents in real-time

More information

Wireless Remote Video Monitoring

Wireless Remote Video Monitoring February 2010 Page 1 An Emerson Smart Solution brings visual information into your control room. Increase Plant Safety Comply with Regulations Scalable Reduced Cost Secure and Reliable Communications Full

More information

Introduction. Industry Changes

Introduction. Industry Changes Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise

More information

Middleborough Police Electronic Security Narrative

Middleborough Police Electronic Security Narrative Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of

More information

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry Needs analysis Reduce disputes over payouts Eliminate theft Detect misconduct and record it for use as evidence in

More information

Court Security Guidelines

Court Security Guidelines July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative

More information

Wireless Remote Video Monitoring

Wireless Remote Video Monitoring October 2014 Page 1 An Emerson Smart Solution brings visual information into your control room. Increase plant safety Comply with regulations Scalable Reduced cost Secure and reliable communications Full

More information

Axis network cameras A wide portfolio of products for professional video surveillance.

Axis network cameras A wide portfolio of products for professional video surveillance. Axis network cameras A wide portfolio of products for professional video surveillance. The market s widest range of network cameras The video surveillance market is thriving, driven by increased public

More information

SECURITY SOLUTIONS BANKING AND FINANCE

SECURITY SOLUTIONS BANKING AND FINANCE SECURITY SOLUTIONS BANKING AND FINANCE Pacom has developed a distinguished reputation as a global leader in the field of remote security management for the banking and financial market. Over 25 years of

More information

Remote Monitoring offers a comprehensive range of services, which are continually

Remote Monitoring offers a comprehensive range of services, which are continually Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have

More information

Totally Wireless Video Security

Totally Wireless Video Security Traditional Video Surveillance ($50,000+) vs. Event-Based Videofied Solution ($2,500) Executive Summary: Totally Wireless Video Security has been effective but cost and complexity has limited deployment

More information

CCTV on IP Network. How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network. A Cisco on Cisco Case Study: Inside Cisco IT

CCTV on IP Network. How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network. A Cisco on Cisco Case Study: Inside Cisco IT CCTV on IP Network How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Security transitioned from analog closed-circuit

More information

A guide to access control for manufacturing sites

A guide to access control for manufacturing sites A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round

More information

Bosch IP An introduction to IP technology and the future of CCTV. Bosch IP Network Video Product Guide

Bosch IP An introduction to IP technology and the future of CCTV. Bosch IP Network Video Product Guide Bosch IP An introduction to IP technology and the future of CCTV Bosch IP Network Video Product Guide 2 3 Changes in CCTV technology have been driven by three main requirements. The first is the need to

More information

GMS GRAPHICAL MANAGEMENT SYSTEM

GMS GRAPHICAL MANAGEMENT SYSTEM GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates

More information

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper Access Control in Commercial Applications Is the future of commercial building security built in, or bolted on? A discussion paper Author: Damian Marsh, Managing Director UK, ASSA ABLOY Access Control

More information

VisioWave TM. Intelligent Video Platform (IVP) Smart Scalable Open. Optimized for high-performance, mission-critical digital video surveillance

VisioWave TM. Intelligent Video Platform (IVP) Smart Scalable Open. Optimized for high-performance, mission-critical digital video surveillance GE Security VisioWave TM Intelligent Video Platform (IVP) Optimized for high-performance, mission-critical digital video surveillance Smart Scalable Open Take a good look at VisioWave TM IVP You ll watch

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Security Alarm Monitoring Protocol

Security Alarm Monitoring Protocol Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or

More information

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Security Service de Services sécurité. Security Alarm Monitoring Protocol Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings

More information

Products. Technology. Services. Delivered Globally. ANIXTER IPASSURED SM FOR SECURITY APPLICATIONS

Products. Technology. Services. Delivered Globally. ANIXTER IPASSURED SM FOR SECURITY APPLICATIONS Products. Technology. Services. Delivered Globally. ANIXTER IPASSURED SM FOR SECURITY APPLICATIONS Anixter is a leading global supplier of communications and security products, electrical and electronic

More information

W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier

W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier W H I T E P A P E R Security & Defense Solutions Intelligent Convergence with EdgeFrontier Contents 1. Introduction... 2 2. The Need for Intelligent Convergence... 3 2.1 Security Convergence with EdgeFrontier...

More information

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution

More information

BANKING AND FINANCE. Advanced technology solutions to maximize the security of financial institutions and branch banks.

BANKING AND FINANCE. Advanced technology solutions to maximize the security of financial institutions and branch banks. BANKING AND FINANCE Advanced technology solutions to maximize the security of financial institutions and branch banks. advisory services. technology delivery. SmartSourcing SM managed services. www.sdisolutions.com

More information

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION Integrated Access Control, Video and Intrusion Platform WIN-PAK WIN-PAK - A Proven Security Integration Platform With over 100,000 systems installed

More information

White paper. Video encoders - brings the benefits of IP surveillance to analog systems

White paper. Video encoders - brings the benefits of IP surveillance to analog systems White paper Video encoders - brings the benefits of IP surveillance to analog systems Table of contents 1. The easy path to network video 3 1.1 Technology shift 3 1.2 Gaining advanced and important functionalities

More information

Appropriate response: A guide to security system integration, monitoring and verification

Appropriate response: A guide to security system integration, monitoring and verification Appropriate response: A guide to security system integration, monitoring and verification The benefits of integrating intruder, fire, access control and audio systems with CCTV for verification of alarm

More information

Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems

Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems United States Environmental Protection Agency Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems Office of Water (M 140) EPA 817-B-15-002B May 2015 Introduction A Water

More information

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost Motorola AirDefense Network Assurance Solution Improve WLAN reliability and reduce management cost The challenge: Ensuring wireless network performance and availability Wireless LANs help organizations

More information

A guide to Access Control in care homes

A guide to Access Control in care homes A guide to Access Control in care homes www.bsia.co.uk 1 of 8 What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets, or vehicles in,

More information

Honeywell Video Analytics

Honeywell Video Analytics INTELLIGENT VIDEO ANALYTICS Honeywell s suite of video analytics products enables enhanced security and surveillance solutions by automatically monitoring video for specific people, vehicles, objects and

More information

Remote Security Management Addresses Security Challenges

Remote Security Management Addresses Security Challenges Remote Security Management Addresses Security Challenges Executive Summary: Facility managers want to provide an environment that is safe for occupants, whether those are tenants, patients, students, staff

More information

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

White paper. Axis Video Analytics. Enhancing video surveillance efficiency White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network

More information

We advance safety and security by finding smarter ways to save lives, improve businesses and protect where people live and work.

We advance safety and security by finding smarter ways to save lives, improve businesses and protect where people live and work. Secure Homes Report 2014 We advance safety and security by finding smarter ways to save lives, improve businesses and protect where people live and work. At ADT Security we have made it our business to

More information

View. Select View Managed Video Services ADT

View. Select View Managed Video Services ADT monitoring Access Control Video Surveillance Intrusion Detection Fire & life safety Commercial Solutions ADT SM Select View Managed Video Services Leverage your existing investment in video surveillance

More information

IP Video Surveillance

IP Video Surveillance IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access

More information

Building Integration System (BIS)

Building Integration System (BIS) Building Integration System (BIS) The Bosch Building Integration System (BIS) is an open PC-based system that applies the best elements of security system technology with the advantages of the latest information

More information

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you Building Management System Total Security & Surveillance Solutions for Building Complexes Intelligent Building Management System Solution

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

SentryScope. Achieving Ultra-high Resolution Video Surveillance through Linescan Camera Technology. Spectrum San Diego, Inc. 10907 Technology Place

SentryScope. Achieving Ultra-high Resolution Video Surveillance through Linescan Camera Technology. Spectrum San Diego, Inc. 10907 Technology Place SentryScope Achieving Ultra-high Resolution Video Surveillance through Linescan Camera Technology Spectrum San Diego, Inc. 10907 Technology Place San Diego, CA 92127 858 676-5382 www.sentryscope.com Introduction

More information

Healthcare Security & Safety Assessment. Ingersoll Rand Healthcare Security & Safety Assessment rev0510 1

Healthcare Security & Safety Assessment. Ingersoll Rand Healthcare Security & Safety Assessment rev0510 1 Healthcare Security & Safety Assessment Ingersoll Rand Healthcare Security & Safety Assessment rev0510 1 Ingersoll Rand Healthcare Security & Safety Assessment Healthcare facilities, especially hospitals,

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose

More information

Tyco Integrated Fire & Security Advanced Integration Solutions

Tyco Integrated Fire & Security Advanced Integration Solutions MONITORING ACCESS CONTROL VIDEO SURVEILLANCE IP SOLUTIONS INTRUSION DETECTION INTEGRATED SOLUTIONS Tyco Integrated Fire & Security Advanced Integration Solutions For large-scale security system integration,

More information

Video Analytics Applications for the Retail Market

Video Analytics Applications for the Retail Market Comprehensive Video Analytics Solutions Customer Traffic In-Store Customer Behavior Operational Efficiency Loss Prevention, Security & Safety Video Analytics Applications for the Retail Market How Agent

More information

SAMPLE HOSPITAL SECURITY ASSESSMENT REPORT

SAMPLE HOSPITAL SECURITY ASSESSMENT REPORT SAMPLE HOSPITAL SECURITY ASSESSMENT REPORT OBSERVATION: The ABC campus is home to the second largest hospital in the XYZ system. The mix of patients, combined with the volume of visitors trafficking through

More information

Improving the Effectiveness of Retail Video Surveillance

Improving the Effectiveness of Retail Video Surveillance Brochure Improving the Effectiveness of Retail Video Surveillance Cisco Video Surveillance for Retail solutions help you boost loss prevention effectiveness and much more. W ha t Y ou Will Lea rn Theft

More information

solutions Deter Criminal Activity

solutions Deter Criminal Activity SCHOOL security & Campus surveillance solutions Protect Students and Staff Deter Criminal Activity Capture Forensic Evidence School Security & Campus Safe and nurturing environments are the necessary foundation

More information

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

White paper. Axis Video Analytics. Enhancing video surveillance efficiency White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network

More information

Palm Beach State College Security Plan

Palm Beach State College Security Plan Palm Beach State Security Plan Prepared by: J.E. Smith Date: September 17, 2008 INTRODUCTION This Security Plan describes the organization, activities, methodology, and documentation by which Palm Beach

More information

A guide to access control for offices

A guide to access control for offices A guide to access control for offices What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building.

More information

Hospital Emergency Operations Plan

Hospital Emergency Operations Plan Hospital Emergency Operations Plan I-1 Emergency Management Plan I PURPOSE The mission of University Hospital of Brooklyn (UHB) is to improve the health of the people of Kings County by providing cost-effective,

More information

LYNX Touch Small Business Solutions DYNAMIC, FULL COLOR SELF-CONTAINED BUSINESS CONTROL SYSTEM. Your Connected Business

LYNX Touch Small Business Solutions DYNAMIC, FULL COLOR SELF-CONTAINED BUSINESS CONTROL SYSTEM. Your Connected Business LYNX Touch Small Business Solutions DYNAMIC, FULL COLOR SELF-CONTAINED BUSINESS CONTROL SYSTEM Your Connected Business LYNX Touch Protected and Connected Honeywell s LYNX Touch self-contained business

More information

Major Risks and Recommended Solutions

Major Risks and Recommended Solutions Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major

More information

Electronic Security. For Financial Institutions

Electronic Security. For Financial Institutions A partner you can bank on Our bank was growing. New branches. New card processing center. We wanted to tie access control, alarm monitoring and video surveillance into one system we could monitor from

More information

Benefits of Standardizing the Video Security System

Benefits of Standardizing the Video Security System SALIENT SYSTEMS WHITE PAPER Benefits of Standardizing the Video Security System Salient Systems Corp. 10801 N. MoPac Exp. Building 3, Suite 700 Austin, TX 78759 Phone: (512) 617-4800 For a variety of reasons

More information

1.4 The banking entities that provide customer service will keep controls of access to the premises.

1.4 The banking entities that provide customer service will keep controls of access to the premises. RULE No. 01-2007 1 (dated November 21, 2007) "Whereby Minimum Security Standards are stipulated for the Banking Entities" THE BOARD OF DIRECTORS using its legal authority, and WHEREAS: Pursuant to Numeral

More information

ATM Video Surveillance

ATM Video Surveillance ATM Video Surveillance with centralized video management Secure your ATMs with robust and reliable video surveillance solution Record record H.264 compressed video using less hard disk space Search search

More information

Policing requirements for Closed Circuit Television

Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 1 Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 2 Closed circuit television (CCTV) systems

More information

Commercial Security Made Simple with Cloud Video Surveillance

Commercial Security Made Simple with Cloud Video Surveillance Commercial Security Made Simple with Cloud Video Surveillance From the Fine Detail to the Big Picture See It All from Anywhere Keep Watch on Your Properties Through the Cloud, 24/7/365 Unlock the all the

More information

How Cisco IT Controls Building Security over the Enterprise WAN

How Cisco IT Controls Building Security over the Enterprise WAN How Cisco IT Controls Building Security over the Enterprise WAN Centrally managed IP-based building security system saves costs and improves safety and responsiveness. Cisco IT Case Study / Security and

More information

Tailored integration to suit you

Tailored integration to suit you UTC Fire & Security Integrated Systems Platforms Tailored integration to suit you We listened to you A majority of the Fortune 100 companies have chosen UTC Fire & Security for their integration needs.*

More information

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating

More information

WLAN-Based Location-Aware Applications for Hospitals

WLAN-Based Location-Aware Applications for Hospitals WLAN-Based Location-Aware Applications for Hospitals PanGo Networks, Inc. January 2005 2005 PanGo Networks, Inc. All Rights Reserved Introduction Hospital environments inherently involve mobility. The

More information

Access CONTROL. MANAGEMENT Software

Access CONTROL. MANAGEMENT Software Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and

More information

An Experimental Access Control System For Enhancing Security And Safety In University Campuses

An Experimental Access Control System For Enhancing Security And Safety In University Campuses Scholars Journal of Engineering and Technology (SJET) ISSN 2321-435X Sch. J. Eng. Tech., 2013; 1(3):172-176 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific

More information

SYMMETRY PRODUCT OVERVIEW

SYMMETRY PRODUCT OVERVIEW ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management

More information

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated

More information

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility Surveillance and Security for Casinos Cost-Effective Solutions for Any Size Facility Honeywell Security Technologies Honeywell s video systems protect many of the world s casino properties. But did you

More information

Crow Limited Warranty. Print Version 017

Crow Limited Warranty. Print Version 017 Crow Limited Warranty (Crow) warrants this product to be free from defects in materials and workmanship under normal use and service for a period of one year from the last day of the week and year whose

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information