Asset management in healthcare

August 2015 Healthcare (Industry), Access Control & Identity Management, Integrated Solutions

Hospitals and other medical care facilities present unique challenges to the security professional. Keeping patients, staff and visitors safe is a constant concern that must be balanced while maintaining an open and comfortable environment. Tangible assets such as prescription drugs, medical supplies and other high value items that are critical to patient care require rigorous security, yet must be easily accessed by authorised staff.

Further, adherence to national/industry regulations and compliance codes presents additional issues for the facility’s security management and must be folded into the overall operational security strategy. Working in tandem with video surveillance and access control, a combination of key control technology and guard tour systems is an effective solution, as illustrated in the following three scenarios.

Key control systems

Regardless of the size or type of medical facility, a physical key control and management system is a fundamental security technology for controlling perimeter doors and those throughout the facility. By securing keys in a tamper proof key cabinet, the facility can meet the Joint Commission on Accreditation of Healthcare Organisations (JCAHO) standards for performance that state, “the hospital controls access to and egress from security-sensitive areas.”

Key control systems are a custom-tailored solution designed to record the access history of each key, including user, date and time of check-out/return. By releasing assigned keys only to users with the proper authorisation code, the system helps to ensure adherence to the hospital industry standardised policies and procedures.

Using minimal wall space, the key storage cabinet can eliminate outdated lock boxes, unreliable manual logs and messy key identification tags. Typically constructed of rugged stainless steel, the systems are designed to resist abuse and are alarm-protected against tampering.

User-friendly PC application software can complement the system and deliver

real-time polling transactions, status, alarm and reporting capabilities. Activity reports can be customised to trace key movements by time, date and user code or biometric access data.

Technology developments and new products have made it possible to integrate key control as part of a facility’s networked security system. Open protocols enable connectivity to access control and other systems via RS-232 or networked via Ethernet to enable a comprehensive integrated security system.

Asset lockers

Medical devices, radios, cellphones, handheld computers and other equipment used by different personnel through the course of any given day represent potential security breaches if stolen or misplaced.

Test material or data from research labs must also be secured when not in use, with access by authorised users only. Even weapons that may have been confiscated from ER patients are potential safety risks if not properly secured. To accommodate these everyday situations, asset lockers that are part of a key control system can provide the necessary storage and safekeeping of these items.

Fernando Pires, VP sales and marketing, Morse Watchmans.
Fernando Pires, VP sales and marketing, Morse Watchmans.

Access devices such as magnetic cards or proximity devices can also be secured in specially designed asset lockers that can be configured into a key control system and used in any combination with standard key or locker modules.

Guard tour systems

Automated guard tour systems are tools that security personnel can use to do their jobs more efficiently and effectively, while helping to visibly reassure hospital staff that the premises are secure. Stations are set-up around the facility, and as the security guard walks by with the handheld device, the system reads and records when it was there.

The device can be programmed to prompt either sequential or random tours for the officers, and the officer can enter a standardised code at any station to report an incident or potential risk such as ice on a walkway or broken light fixture. In a medical environment, this can be a tremendous benefit to help counter liability issues.

For more information, contact Morse Watchmans, +1 203 264 4949, morse@morsewatchman.com, www.morsewatchmans.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.