Dr. Michael Pinsky has assembled an expert team of authors on the topic of Hemodynamic Monitoring. Articles topics include: The interface between monitoring and physiology at the bedside; Defining goals of resuscitation in the critically ill; Minimally invasive hemodynamic monitoring; Bedside ultrasound for the intensivist; Invasive hemodynamic monitoring; Functional hemodynamic monitoring; Using what you get: dynamic physiological signatures of critical illness; and Effect of organizational issues on resuscitation effectiveness.
IAHSS Healthcare Basic Security Guideline Placement
1. The Healthcare Environment
Categories of Healthcare
Types of Hospitals
Nonhospital Side of Healthcare
Diverse Stakeholders
Staffing the Medical Care Facility
Physician Role Impacted
The Healthcare Security Administrator
The Joint Commission
Health Insurance Portability and Accountability Act (HIPAA)
The Centers for Medicare and Medicaid Services (CMS)
2. Protecting a Healing Environment
Defining Healthcare Security
Basic Rationale of Healthcare Security
Evolution of Healthcare Security
Security, Risk Management, Safety
Developing the Security System
Psychological Deterrents
Basic Security Program Objectives
External Forces
Body of Knowledge
3. Security Risks and Vulnerabilities
Basic Healthcare Security Risks/Vulnerabilities
Primary Security Risks
Facility Security Risk Assessment
4. Security Management Planning
Security Management Plan
Security Strategic Plan
5. Managing the Basic Elements of Healthcare Security
Customer Service
Maintaining an Orderly Environment
Preventative Patrol
Incident Reporting and Investigation
Response to Requests for Service
Security Communications
Parking and Traffic Control
Accident Reporting and Investigation
Security Education and Training
Applicant Background Investigation
Reaction to Internal and External Emergencies
Enforcement of Rules and Regulations
Access Control
Liaison with Law Enforcement and Other Government Agencies
Internal and External Audits
Locks and Keys
Other Support Services
Public/Employee/Community Relations
6. Security Department Organization and Staffing
Security Function Reporting Level and Support
Types of Security Staff
7. Security Force Administration
Management
Supervision
Relationship with Officers
Motivation
Performance Management
The Security Officer
Selecting Security Personnel
Full-Time Versus Part-Time Security Officers
Wage Compensation
Retention
Performance Expectations
8. Security Attire and Equipment
Uniforms
Use of Firearms
Other Equipment Considerations
Use of Force
Training
Security Operations Manual
9. Training and Development
Training Concepts
Types of Training
New Security Officer Training
IAHSS Progressive Certification Program
Specialized or Supplemental Training
Elective Training
Leadership Development
Training Resources and Records Requirements
10. Deployment and Patrol Activities
Flexing the Security Staffing Plan
Deployment Objectives
Scheduling the Security Staff
Deployment Patterns and Concepts
Post Assignments
Basic Patrol Deployment Plans
Patient Care Units/Areas
Entrances and Exits
Basic Patrol Concepts
Security Officer Response
Patrol Problems
11. Program Documentation
Purpose of Records
Administrative Records
Computer-Generated Reports
Basic Records
Security Supplemental Report
Security Condition Report
12. Patient Care Involvement
Patients
Assisting with Patients
Patient Risk Groups
Patient Property
Visitors
13. Public Safety Liaison
Dynamics of Security and Law Enforcement Liaison
Police and Security Cooperative Programs
Requests for Law Enforcement Service
Police Interaction with Patients and Employees
Security and Law Enforcement Liaison
Security and Nonpolice Liaison
14. Human Resources and Staff Responsibilities
Human Resources Office
Selecting Staff Through Due Diligence
Applicant Suitability Information
Employment Application Forms
Applicant Background Verification
Deceptive Applicant Information
Background Screening Providers
Security Role in the Hiring Process
Staff Identification Badges
Security-Oriented Employment Guidelines
15. Employee Involvement and Security Awareness
Employee Security Education and Motivation
Hospital Watch
16. Investigative Activity
Fair Credit Reporting Act (FCRA)
Security Versus Police Investigation
Types of Investigation
Incident Investigations/Two Phases
Investigator Attributes
Interviewing and Interrogation
Undercover (Covert) Investigations
Employee Informants
17. Physical Security Safeguards
Basics of Physical Security
Designing a System of Perimeters
Barriers
Lighting
Trees and Shrubs
Locks and Keys
Seals
Glazing (Glass)
Fastening Down Equipment
Marking Property
Safes
Signage
Crime Prevention Through Environmental Design
18. Electronic Security System Integration
Security Master Plan
Security Design Considerations
The Central Security Station
Alarms
Access Control
Video Surveillance
Other Security Technology Applications in Healthcare
Testing of Security System Components
Security Technology Implementation Tips
19. Preventing and Managing Healthcare Conflict and Violence
The Who (Perpetrators/Visitors)
The What and the Why
The When and the Where
The Management of Healthcare Violence
Preventing Violence in the Workplace
20. Security Sensitive Areas
Security Sensitive Areas
Infant Abductions from HCFs
Identification
ED Security
The Hospital Pharmacy
21. Areas of Special Concern
Health Information Management
Child Development Centers
Business Office/Cashiers
Information Technology
Intensive Care Units
Gift Shops
Compressed Medical Gases
Food Service
Roof Areas
22. Off-Campus Considerations
The Need for Off-Campus Facilities and Services
23. Parking Control and Security
Types of Parking Areas
Parking Shuttle Service
Valet Service
Types of Parkers
Automated Controls
Traffic Flow and Space Allocation
Pay-for-Parking
Parking System Violators
24. Emergency Preparedness?Planning and Management
Basics of Emergency Planning
Primary Manmade Emergency Events
Accidental and Natural Emergency Events
General Administrative and Operational Issues
25. A Primer for Healthcare Executives
Glossary
Appendix I Monthly Occurrence Report
Appendix II Security Services Request for Proposal
Index