Access to hospital

December 2007 Access Control & Identity Management, Healthcare (Industry)

The alleged rape of a student doctor on the premises of Chris Hani Baragwanath Hospital in Gauteng on 1 August grabbed media headlines around South Africa. In so doing, the incident highlighted serious security gaps in the country's healthcare sector, says Jack Edery, CEO of Elvey Security Technologies.

This is not the only criminal incident to have occurred on hospital premises in recent times, where staff members, patients, visitors and contractors can be forgiven for letting down their guard in their belief that these are safe havens, he says. "Hospitals, which ironically are dedicated to saving lives, are also places where babies are stolen out of wards, cars from parking lots and patients' belongings regularly go missing."

Quoting an article published in The Star newspaper on 1 August 2007 ('Hospitals tighten security after rape at Bara'), Edery highlights comments by Democratic Alliance MPL Jack Bloom. "In the article, Bloom points out that this was not the first rape to occur at a Gauteng hospital and also that the results of a survey by his party last year revealed that 83% of nurses in Gauteng did not feel safe at work. This is certainly cause for concern.

"Make no mistake, securing a large entity where there is a continuous passage of public and employee feet in and out is a task only for the professionals," Edery says. "However, there are solutions and as a company, we strongly advise the use of integrated security systems."

CCTV, GPRS/GSM communication and visual verification

Owing to the fact that the public has free access to most parts of hospitals, it is difficult to identify criminals and spot potential incidents, says Elvey's new business development manager Michael Brett. "This necessitates the need for an integrated security system that combines visible guarding with CCTV (closed circuit television) and a measure of access control to restricted areas. Such a system would not only serve as a deterrent to criminal activities, but would also allow for information gathering in the event of an incident, hopefully allowing the police to bring criminals to book."

Brett believes that government needs to spend money on security in healthcare environments, to protect "the most precious commodity of all, that of human lives". In his experience, CCTV cameras are a vital component of hospital security and should ideally be part of an on-site video system that is installed and monitored by professionally-trained outsiders. The value of this type of system lies in its ability to monitor not only the comings and goings of people but also babies and other patients in order to prevent theft, malpractice and abuse, he maintains.

Along with technology, Brett advocates the use of guards - provided there are controls in place to overcome traditional problems, which include not being able to ascertain the whereabouts of guards and guards subjected to criminal duress. "Elvey assisted with the installation of an integrated system at a Cape Town hospital, which now has a CCTV system with cameras that are manned 24/7, and it is working very effectively," he says.

Guard control

"Guard control is best done by using GPRS/GSM technology, which ensures that guards are always in contact with their monitoring stations," says Tommy Klopper, Elvey's access control product manager. "These devices are taking the guarding factor to a different level."

Easily integrated with identification and access control technology, GPRS/GSM data transmission allows for realtime communication between guards and control rooms via the touch of a button. It has numerous functionalities that extend to providing immediate notification to the monitoring station in the event of an emergency. "It also speeds up intervention, which tremendously improves the security of both people and property. In addition, it enables the monitoring station to retain voice communication with the guard while on his rounds," he explains.

Essentially this technology incorporates three different devices, which Klopper says makes it a world-first. "It is a Web-based guard patrol monitoring system, which transmits data on a realtime basis through GSM networks and thereby gives the control room second-by-second updates on the whereabouts of guards," he says.

"Secondly, it has a panic button which allows for instant communication with the control room in the case of an emergency. This is a major safety and security benefit for guards, who can derive additional peace of mind from a radio facility that facilitates two-way voice communication between employee and control station. In the event that the guard fails to reach a certain point at a certain time, the control room immediately knows something is wrong and can take relevant action.

"Users are not able to make calls to the control room but they can let the operator know of their need for a voice connection by pressing a button. The technology also allows operators to call them in the same way as they would using a GSM phone.

Access control

Controlled access to restricted areas is also vital in a healthcare environment in the interests of both security and convenience, says Klopper. He is a proponent of integrating biometric interfaces with different levels of access control to allow for the effective monitoring of staff as well as the general public.

"The ideal staff monitoring system is one that uses biometric cards or tags to give them access to specific departments only." Further to this, these verification cards and tags will also prevent unauthorised access to stock rooms, pharmacies, operating theatres and other high security areas, he says. A huge benefit of modern technology is that access control can be integrated with time and attendance and that public access can be limited to specific areas with the use of temporary cards.

In addition to verification capabilities, a hospital security system should also offer realtime and after-event camera-recorded data, Klopper believes. For best results, cameras should be set up at all access points and professionally positioned in order to be able to record clear facial and vehicle images. Minimum criteria include wide dynamic range (WDR) lenses, which are able to cope with and rectify poor lighting conditions to ensure perfect pictures for recognition and identification purposes.

For employee monitoring, the latest technology uses fingerprint time clocking, which he says is highly cost-effective and allows for individual employee identification. This prevents unauthorised clocking, which has always been a problem with work-forces. Units can store up to 4000 fingerprint templates and 30 000 transaction records, and the systems can also be programmed to operate door and other access barriers, adding to their many benefits, he concludes.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.