{"id":341177,"date":"2024-10-19T23:55:05","date_gmt":"2024-10-19T23:55:05","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-ts-168502015\/"},"modified":"2024-10-25T23:06:25","modified_gmt":"2024-10-25T23:06:25","slug":"bsi-pd-cen-ts-168502015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-ts-168502015\/","title":{"rendered":"BSI PD CEN\/TS 16850:2015"},"content":{"rendered":"
The standard will specify requirements for planning, establishing, implementing, operating, monitoring, reviewing, maintaining and continually improving a documented security management system in healthcare facilities.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
4<\/td>\n | Contents Page <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | European foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 1 Scope 2 Terms and definitions 3 General guidance 3.1 Approach 3.2 Context of the HCF security management <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 3.3 Compliance with national legislation 3.4 Risk management <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3.5 Leadership 3.5.1 General 3.5.2 Organization of roles, responsibilities and authority <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 3.6 Establishment of a security management policy 3.7 Security Management Plan (SMP) <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 3.8 Interfacing with other management systems 4 Operational guidance 4.1 Organization (General procedures) 4.1.1 Controlled areas 4.1.2 Access control 4.1.2.1 General <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4.1.2.2 Level of access control 4.1.2.3 Access control requirements <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.1.2.4 Identity cards – receipt and conditions 4.1.3 Secure storage 4.1.4 Facility restricted access (emergency lockdown) <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4.1.5 Car park and vehicle control 4.2 People 4.2.1 Staff 4.2.1.1 Staff selection & screening <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4.2.1.2 Wearing of identity cards <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4.2.1.3 Workplace violence 4.2.1.4 Contracting 4.2.1.5 Home health security <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4.2.1.6 Role of security personnel in patient management 4.2.1.7 Restraining by staff <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 4.2.1.8 Training of personnel <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4.2.1.9 Security Awareness Program (SAP) 4.2.2 Visitors <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4.2.3 Patients 4.2.3.1 Searching patients and patient area for dangerous items <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 4.2.3.2 Paediatric security <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 4.2.3.3 Wandering patients search 4.2.3.4 Patients with protective status 4.2.3.5 Patient property security <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 4.3 Facilities and technology (infrastructure and access system) 4.3.1 Design and construction <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 4.3.2 Physical security 4.3.3 Fences and walls 4.3.4 Closed circuit TV (CCTV) <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 4.3.5 Identity cards 4.3.6 Technologies and alarm systems <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 4.3.7 Control rooms 4.3.8 Accommodation for patients with protective status or prisoners 4.3.9 Security signage <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 4.3.10 Alternative entries 4.3.11 Operating (surgery) rooms security 4.3.12 Emergency unit security <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 4.3.13 Burglar and intruder resistant areas <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 4.3.14 Personal attack alarms (Panic alarms) 4.3.15 Cash and other monetary processing systems <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 4.4 Security incident response 4.4.1 General 4.4.2 Criteria <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 4.4.3 Minimizing possibility of recurrence 4.4.4 Reports and statistics 4.4.5 Incident report 4.4.6 Interfacing with first responders and emergency management <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 4.4.7 Targeted violence <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 4.5 Plans for special cases 4.5.1 Child abduction 4.5.2 CBRN incident response 4.5.3 Prisoner patients 4.5.4 Offensive weapons and other dangerous equipment <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 4.5.5 Active shooter <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 4.5.6 Drug diversion and security of CBRNE substances <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 4.5.7 Vehicle and aircraft security 4.5.8 Media <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 5 Performance evaluation 5.1 General 5.2 Management review 6 Exercise and testing <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Societal and Citizen Security. Guidance for managing security in healthcare facilities<\/b><\/p>\n |