Security Management
Transcript of Security Management
Version 1.1. December 2016
Security Management
Target Audience
Who Should Read This Policy
All Trust staff including agency, temporary and locum staff
Security Management Policy
Version 1.1 December 2016
2
Ref. Contents Page
1.0 Introduction 4
2.0 Purpose 4
3.0 Objectives 4
4.0 Security Arrangements and Procedures 4
5.0 How the Trust risk Assesses the Physical Security of Premises and
Assets 13
6.0 Procedures connected to this Policy 14
7.0 Links to Relevant National Standards 15
7.1 Links to Relevant National Standards 17
7.2 Links to other Key Policies 17
7.3 References 17
8.0 Roles and Responsibilities for this Policy 18
9.0 Training 21
10.0 Equality Impact Assessment 21
11.0 Data Protection and Freedom of Information 21
12.0 Monitoring this Policy is Working in Practice 22
Appendices
1.0 Building /Ward Security Risk Assessment 23
2.0 Security and Crime Reduction Risk Assessment 28
3.0 Contacts for Security Incident and Advice 34
Security Management Policy
Version 1.1 December 2016
3
Explanation of terms used in this policy
Assets - Irrespective of value, assets are defined as the materials and equipment used to deliver NHS
healthcare. In respect of staff and patients it can also mean the personal possessions they retain whilst working in, using or providing services to the NHS
Local Security Management Specialist (LSMS) - The role of the Local Security Management Specialist is to deliver security management work locally in accordance with National Statutory
Direction and guidance issued through the Trust and NHS Protect
Lock Down - The process of controlling the movement and access - both entry and exit - of people (NHS patients, staff, or visitors) around a Trust site or other specific Trust building/area in response to
an identified risk, threat, hazard that might impact on the security of patients, staff, visitors or assets
or, indeed, the capacity of that facility to continue to operate
NHS Protect - Formerly NHS Counter Fraud and Security Management Service it has overall responsibility for all policy and operational matters related to the management of security in the NHS
Property - Property is defined as the physical buildings in which NHS staff work, where patients are treated from and where the business of the NHS is delivered
Security - The protection of assets of all kinds against loss from theft, fire, fraud, criminal acts or
other injurious sources
Standard - A published document that contains a technical specification or other precise criteria
designed to be used consistently as a rule, guideline, or definition. All standards take the form of either: specifications, methods, vocabularies, codes of practice or guides
Datix - Name of the Trust’s electronic Incident Reporting System
Security Management Policy
Version 1.1 December 2016
4
1.0 Introduction It is recognised that crime against NHS can have a serious impact on everyone who works within or uses its services. All of those working in the Black Country Partnership Foundation NHS Trust have a responsibility to be aware of these issues and play an active role in managing the risks related to criminal activity and breaches of security. The Trust is committed to providing a safe and secure environment that protects patients, staff and visitors, their property and the physical assets of the organisation so far as is reasonably practical. This policy is part of the Trust’s commitment to managing its risk agenda and sets out the responsibilities and arrangements in place to realise this commitment. 2.0 Purpose The purpose of this policy is to detail the Trust’s strategy/legislative compliance in maintaining a safe working environment, and safe and secure healthcare premises. 3.0 Objectives Identify organisational and individual responsibilities in the management of
Trust, personal and patient property Identify good practice principles on how to assess and reduce the risk of
damage and loss Ensure employees are aware and provided with suitable support in raising
security awareness Recognise the importance of recording and monitoring of adverse incidents in
line with local and national frameworks Develop a partnership with local agencies, e.g. police and local authorities for a
safe and secure trust environment 4.0 Security Arrangements and Procedures 4.1 Resolving Security Management Matters in the First Instance Security management matters should be discussed directly with managers as safety and security will always be an essential and integral function of management. If the matter is unresolved or more specialist advice is required issue should be raised with the Local Security Management Specialist (LSMS) or a member of the Health and Safety Team. The Trust will always endeavour to reduce the impact that crime and security related matters may have on patients, staff and visitors and will always aim to identify solutions and prioritise resources to address identified issues. 4.2 Management of Routine Security Issues The Local Security Management Specialist is responsible for the routine management of non-clinical security issues; with the exception of information systems security. The LSMS will exercise specific responsibilities on behalf of the Security Management Director (SMD). Key Responsibilities of the LSMS are:
Security Management Policy
Version 1.1 December 2016
5
Crime Prevention Advice, support and assistance in upholding and developing operational arrangements that affect security
Review all security incidents and ensure non-clinical security risk assessments and crime reduction surveys are conducted in all Trust properties
Liaise with external agencies regarding non-clinical security matters e.g. Police, Crown Prosecution Service, NHS Security Management Service Legal Protection Unit
Advise Executive directors of any impact resulting from new legislation or national directions / guidance
4.3 Incident Reporting Reporting incidents is important, whether actual, injury or a ‘near miss’ occurs. Please refer to Incident Reporting Policy for more detailed guidance. All security related incidents, e.g. episodes of violent, aggressive and unacceptable behaviour, must be recorded on Datix. All security related incidents will automatically be brought to the attention of the LSMS via the Datix system, for further investigation. The Datix system, once compatible, will be reporting direct to NHS Protect via the Security Incident Reporting System (SIRS), all security related incidents (e.g. physical assaults, threatening behaviour, and criminal damage). 4.4 Identification Badges All Trust staff will be issued with an Access Control Identification Badge containing their personal details, current photograph and their role which must be worn whilst on duty at all times. 4.5 Control and Issuing of Identification Badges and Security Access/Swipe Cards The Trusts Estates department with Human Resources (HR) are responsible for all aspects of controlling and issuing identification badges and security access/swipe cards centrally from the Trust Headquarter and will ensure:
That ID badges and security access passes are only issued from the designated points Delta House and Penn Hospital
That HR provides monthly updates to Estates of personnel who have left the Trust to enable the deactivation of cards and removal of names from the systems data base
That no contractor or non clinical staff is provided with a security access card onto any ward
Refer to the Trust Policy and procedures on Electronic Door Access Control 4.6 Security of Trust Buildings and their Contents Buildings within the Trusts control, either owned or leased are provided with a means of access control whether it is keys, combination locks, fobs, swipe card.
If the building has a public access area such as a foyer or corridor, then access control is to ensure that non-public areas are secure
All buildings will be provided with an intruder alarm system
Vulnerable areas of buildings are to be reasonably covered by external lighting
Security Management Policy
Version 1.1 December 2016
6
Consideration will be made of the level of security required for ground floor i.e. doors and windows based on the value of the contents and the cost of measures such as bars and grills if appropriate
All buildings are to be left locked and secure, with appropriate security systems activated, access doors and gates locked and keys returned to relevant key holding areas
All staff are to be aware of the security of the building and their role in maintaining the security
4.7 Access Control Measures – Inpatient Wards The Trust believes that safeguarding the welfare of adults and children from abuse is paramount: the safety of patients, staff and visitors is also our utmost priority. In recognising our responsibilities and duty of care to ensure provision of safe and secure environments inpatient wards are secured to restrict access to only the necessary staff members. The Trust recognises that those patients admitted to Mental Health wards have complex, specific and individual needs. The locking of ward doors is intended to protect patients from self-harm, suicide, accidents or inflicting harm on others. This extends to protecting our patients and staff from others gaining access to the wards. This approach is compliant with the Mental Health Act, Code of Practice (Chapter 16).
Access points to all inpatient wards are locked (magnetically) with only relevant staff having access to these areas
The staff groups with access will be agreed by management and ID cards will be updated accordingly
4.8 Access to Wards by Non-Clinical Staff/ Contractors
Staff who are not contracted to work on any inpatient ward will not be issued with an access passes to any ward. All other staff who require access to the ward environment will do so by prior arrangement /agreement from ward staff
Contractors will not be issued with an access pass onto any ward and will only gain entry by prior arrangement with Estates and the relevant ward manager
All other staff/ contractor entering a ward environment for any reason at all times must sign in/ out of the ward and must be escorted/supervised by a ward member of staff at times
This safeguard will ensure staff and contractors do not inadvertently intrude upon situations that could compromise their safety or the privacy and dignity of patients. 4.9 Personal Security of Staff The Trust has taken a number of measures to protect the personal security of its employees which include:
The installation of security and panic attack alarms systems where a need has been identified
Use of CCTV in areas that have been identified as high risk
Issuing of mobile phones to lone workers
Installation of appropriate lighting and fencing to external areas
Provision of Management of Potential Aggression and Promoting Safer Therapeutic Services (PSTS) Training to staff
Security Management Policy
Version 1.1 December 2016
7
The adoption of a zero tolerance approach in relation to acts of theft, vandalism or assault
4.10 Personal Alarms/ Static Alarms In line with the Lone Working Policy, lone working risk assessments should be undertaken by the manager to highlight whether a personal alarm should be issued to the staff member where there is a level of risk to staff safety. This is particularly relevant to those staff that work in the Community. Please refer to Lone Working Policy for more detailed guidance. Static alarm buttons should be located in interview/ reception areas, if personal alarms are not available to staff. There should be a prompt response when the alarm is activated and the police called where it is deemed that a police presence is required. Staff should notify their manager, and where appropriate involve the LSMS; if they believe there are unmanaged security risks to staff safety. 4.11 Security of Personal Property (Staff) All staff are responsible for the safety and security of their personal possession at all times whilst at work and must comply with the following:
Avoid bringing valuables in to work
Avoid leaving money in office draws
Use security lockers where provided 4.12 Security of Service Users’ Property Loss of property can cause great inconvenience and stress to service users and can also lead to mistrust among staff. Service users should be persuaded, where possible, not to bring valuable items or large sums of money onto the premises. Where property is handed over for safe keeping this should be recorded and secured in accordance with the procedures specified in the Trusts Procedure for the handling of patients money and property. Refer to the Trust policy on handling/safeguarding patients’ monies and property. 4.13 Lost and Found Property Service users, staff and visitors need to understand that the Trust take lost property seriously. All lost property incidents are to be investigated at ward/department level in the first instance and reported on DATIX. Should it be identified that an employee of the Trust was responsible for the loss, staff are to seek advice from their manager regarding compensation for the loss. Any found property is to be handed into the local general office or reception for safe keeping. 4.14 Cash Handling/Petty Cash Where cash is handled on behalf of the Trust and/or patients, managers must ensure that any risks associated with this activity are assessed and appropriate control measures implemented accordingly.
Security Management Policy
Version 1.1 December 2016
8
Procedures for handling of cash must be in line with Trust policies and procedures. Any discrepancies in cash should be reported immediately. Minimum control measures are:
Two people must be present when cashing up and preparing cash for banking
Cashing up and preparing money for banking should not take place in view of the public
Cash must be stored in a locked safe that is secured to the floor/wall until banking takes place
At least two people must escort the money to the safe
Banking should be carried out regularly by contracted services
Wards and departments are to hold only the minimum amount of cash that is necessary, and this is to be held in accordance with Trust policies and procedures
If required managers are responsible for ensuring that they have enough staff who are authorised signatories to enable service user banking to take place
4.15 Fraud Fraud is a serious offence and diverts Trust funds from providing the best possible quality health care. A Local Counter Fraud Specialist has been appointed by the Trust to tackle counter fraud and corruption. All allegations of fraud are taken seriously by the Trust and offenders face both disciplinary action and prosecution. The Trust’s Standing Financial Instructions must be strictly followed at all times. Any indications or suspicions relating to fraud should be immediately reported to the Local Counter Fraud Specialist. Please refer to the Anti-Fraud, Bribery and Corruption Policy for more detailed guidance. 4.16 Drug/ Medicine Security All medicines issued must be stored in a locked cupboard that conforms to British Standards either BS3621 or BS2881.
Medicine trolleys must be secured to the wall, except during the medicine round; they must only be used for medicines in current use, but not controlled drugs
The trolley must not be left unattended during the medicine round
If trolleys are not used, a separate section of the storage cupboard should be designated for medicines in use
Pharmacy boxes for the transportation of medicines are to be locked at all times when containing medicines except during packing and unpacking of the contents and their transfer to the ward/clinical area medicine cupboards
Each patient involved in a self-administration of medicines scheme must have a lockable receptacle (e.g. drawer), which is not readily portable
4.17 Storage and Management of Controlled Drugs
Controlled drugs must be stored in a locked cupboard that meets the Misuse of Drugs Safe Custody regulations 1973, reserved solely for this purpose (this must not be a medicine trolley)
The controlled drugs key is the responsibility of the nurse in charge and should be kept on their person and stored separately from other drug keys
Security Management Policy
Version 1.1 December 2016
9
A controlled drug register must be maintained and kept locked in a secure place when not in use
4.18 Security in Transit
All Trust employees transporting medicines must carry their Trust identification badge during the transport. This should be shown if requested by a patient, or any other person with reason to check the identity of the employee
Approved bags, not identifiable as containing medication but preferably marked on the inside with the Trust name and address must be used to carry medication. This includes stocks from the team base for patient administration, and pharmacy dispensed prescriptions for delivery to patients’ homes
Packages including ward boxes must not be left unattended. Delivery vans must be locked when unoccupied
The Policy for the Safe and Secure Handling of Medicines must be followed at all times. 4.19 Security of Keys
The Manager for any department or ward which has key security systems is responsible for ensuring that it is kept locked at all times
All keys / fobs and access devices must be signed for from the issuing person and returned and signed back in within the stated timeframe
All keys / fobs and access devices held on wards must be signed out/in during handover and shift changes
The managers will maintain an up to date log of keys/fobs and access devices signed out and carry out weekly checks to ensure items are being accounted for
Any access item found to be deficient during handover is to investigated and reported on DATIX
Under no circumstances should security keys/access fobs or swipe cards be removed from any ward or Trust premises
For new premises, keys will be issued to cover staffs requirements. The control of keys is then the responsibility of the Manager and replacements will have to be funded from department budgets
New keys will only be supplied when locks are found to be defective or exchanged
When staff leave the Trust or move to another department the Manager must retrieve any keys, fobs and other security devices held by the staff member
4.20 Car Parking and Vehicle Security Car parking must be confined to the designated areas which are all provided with lighting. Staff should lock their vehicles and security devices, where fitted, should be activated. “The Trust will not accept any responsibility for thefts from or damage to vehicles whilst they are on Trust property” Vehicle Security:
Staff should lock their vehicles, and security devices, where fitted, should be activated
Trust vehicles must be locked and the security devices/alarm as fitted are activated at all times when the vehicle is to be left unattended
Security Management Policy
Version 1.1 December 2016
10
Lease car drivers must, when parked, lock their vehicle and activate the security device/alarm in accordance with the Lease Car Users Regulations for Employees and Trust Lease Car Scheme Principles and Conditions
Where possible all personal items and any Trust property should be removed from view in the vehicle when it is left unattended, thus limiting the possible risk of theft and damage to the vehicle
4.21 Closed Circuit Television (CCTV) The operation of CCTV systems at the Trust is in line with the Data Protection and Human Rights Act. Access to images is restricted unless in support of crime detection or at the request of statutory bodies provided that all Data Protection protocols are observed. Please refer to CCTV Surveillance Policy for more detailed guidance. 4.22 Arrangements for Lock Downs A Lock Down is a process that allows staff to assert or regain control of a situation that appears or escalates with little warning. In securing all or part of the premises against individual entry, staff, through the implementation of lock down, can gain some breathing space, while providing short-term protection to themselves and their patients. Examples of the types of incident that necessitate lock down are:
Contamination incident in the local area that may lead to people/ patients self-presenting at Accident and Emergency Department
Self-presenting patients who are suspected of suffering from chemical/ biological/ radiological/ nuclear contamination
Gang-related conflicts, weapons, identified shooters on premises
Bomb alerts/ terrorist attack, terrorist threats Risk profiles need to be completed by each site manager with support and advice as necessary from LSMS, Estates, Health and Safety, Fire Safety Officer, Governance Assurance Unit and Human Resources. Please refer to the Lockdown Policy for more detailed information and guidance on lock down risk profiles. 4.23 Locking up Procedures Locking up procedures undertaken by the Contract Security team is in place at specific Trust location. However where this not applicable all employees must ensure of the following actions:
Ensure that offices are secured by locking the door and closing all windows
Ensure that all access / exit doors are closed and where intruder alarms are fitted that they armed before leaving the building
Where security gates are fitted ensure that they are closed and locked In addition issues relating to the effectiveness of locking up procedure affecting the safe environment should be brought to the attention of the line manager with responsibility for that building.
Security Management Policy
Version 1.1 December 2016
11
4.24 Contractors
Contractors are expected to adhere to the security procedures and staff managing contracts/ contractors are responsible for ensuring security is maintained
In accordance with Health and Safety guidelines all building and maintenance contractors, including IT, must report to the Estates Department, who issue a permit to work and visitor identification badges which must be displayed at all times when on the premises
The Estates Department will inform the security, line managers etc. of contractors planned to be working out of hours, providing details of work to be conducted, duration and the number of contractors
Any contractors found working on the premises that have not been issued with prior notification will not be allowed to continue and may be asked to leave the premises. Access to restricted areas must be arranged in advance and contractors escorted whilst in restricted area. The Trust does not undertake to provide secure areas for contractors’ tools and equipment and as such contractors are responsible for the security of their tools and equipment whilst on Trust property. 4.25 Managing Incident Needing Police Assistance The Trust will support any management decisions to call the police to assist with the management of a security related incident, where the perpetrator may still be on the premises or security advice and support would be welcome. In these circumstances, once on site, the police will direct the management of the incident. The staff member in charge at the scene should give the police a concise and thorough briefing upon their arrival. The On-Call-Directors and LSMS should be notified as a matter of urgency to support the appropriate management of the incident.
4.26 Suspicious Packages - Guidance for staff
When dealing with suspicious items apply the 4 C’s protocol:- All staff should remain vigilant and be on the lookout for unusual or suspicious behaviour. If unexpected or unknown visitors are observed in restricted areas of a premises, or a package or object is found unattended in an unlikely spot, then there should be an immediate response. If there is a suspicion, however slight, that there is potential danger to staff and visitors on site, the senior manager should be contacted and a prompt response to the situation initiated. If there is a risk to safety, the local evacuation plan should be activated and an immediate evacuation should commence. The 4 C’s protocol is summarised as:
Confirm – as far as practicable the existence of a ‘suspicious device’.
Clear (the area) - evacuating away from the device.
Communicate – to managers and persons affected in the vicinity/building. Inform Police.
Control - set a cordon, do not allow anyone near the device or building (100 metres minimum).
Security Management Policy
Version 1.1 December 2016
12
CONFIRM whether the item exhibits recognisably suspicious characteristics
The HOT protocol may assist your judgement:-
HIDDEN?
Has the item been deliberately concealed, or is it obviously hidden from view? OBVIOUSLY suspicious?
Does it have wires, circuit boards, batteries, tape, liquids or putty-like substances visible? Do you think the item poses an immediate threat to life?
TYPICAL?
Is the item typical of what you would expect to find in this location? Most lost property is misplaced in locations where people congregate. Ask if anyone has left the item. If the item is believed to be unattended rather than suspicious, examine further before applying lost property procedures. However, if ‘H-O-T’ leads you to believe the item is suspicious, continue to apply the 4 C’s.
CLEAR the immediate area
Do not touch the item. Mark its position if practicable with a distinctive item, such as placing a ‘red coat’ next to it (as long as this does not delay the immediate evacuation away from the device).
Take charge and evacuate to a safe distance. Even for a small item such as a briefcase, move at least 100m away from the item starting from the centre and moving out.
If in a building, upon exiting attempt to wedge or prop doors open where possible, to provide a unhindered route to the package.
Keep yourself and other people out of line of sight of the item. It is a broad rule, but generally, if you cannot see the item then you are better protected from it.
Think about what you can hide behind. Pick something substantial and keep away from glass such as windows and skylights.
Cordon off the area.
COMMUNICATE - call 999
Inform your supervisor and Police.
Do not use radios or hand held mobile telephones within 15 metres of the device.
CONTROL - access to the cordoned area
Members of the public should not be able to approach the area until it is deemed safe.
Keep eyewitnesses nearby so that they can liaise with police upon their arrival and state what they saw at the earliest opportunity.
The evidence at the scene will need to be preserved to support follow up investigations.
Security Management Policy
Version 1.1 December 2016
13
5.0 How the Trust Risk Assesses the Physical Security of Premises and Assets It is a requirement that managers complete the Workplace Security Assessment at Appendix 1 regarding the security measures of their working areas. This assessment will be completed every 12 months and returned to the Local Security Management Specialist (LSMS).
Copies of the completed risk assessment will be sent to relevant service managers for the required action to be taken. It is the responsibility of the service manager to coordinate the completion of the actions
The LSMS will enter the inspection findings onto a database in order to monitor that risk assessments are taking place and to inform the required organisational overview
Control measures identified by the risk assessment will be implemented by the departmental manager to reduce risk
If risks are not, or cannot be managed at a local level, they will be escalated by the manager to their Divisional Quality Group meetings and if required submitted on to the Divisional and/or the Corporate risk register
Risk assessments will be reviewed annually or sooner where circumstances dictate e.g. security incidents, change of building function etc.
In addition the LSMS will complete a Crime Reduction Survey (Appendix 2) relating to the physical security measures of each Trust site and department/ward. This survey will be completed every 2 years. 5.1 Arrangements for the Organisational Overview of Risk Assessments of the Physical Security of Premises and Assets The LSMS will maintain and monitor a database of security risk assessments provided by managers regarding the physical security of premises and assets and will:
Provide a bi-monthly report on the completion of risk assessments to the Health, Safety & Committee in order than an organisational overview is maintained
5.2 Security Risk Assessment of Multi-Occupancy Buildings In multi-occupancy buildings, the managers of the various services within the building must liaise and agree a process for the completion of the Security Risk Assessment and management of security in general. The LSMS will provide assistance to the manager if areas have complex security needs and will work with the manager to complete a more detailed risk assessment. All issues identified in the risk assessment which require control measures are to be included in an action plan. 5.3 Action Plans
5.3.1 How Action Plans are Developed as a Result of Risk Assessments If the action required is urgent, then the issue is to be discussed with the manager and the required action implemented via the appropriate service, for example Estates Department.
Security Management Policy
Version 1.1 December 2016
14
For advice and assistance contact the LSMS/and or the Health and Safety Team. The action plan is to be agreed by the LSMS and the Manager. The action plan is to contain the following information:
Who has overall responsibility for the action plan (if not the Manager)
What the risk is
What is required to mitigate the risk
Who is responsible for the required action
When the action is to be completed
The manager is to forward a copy of the risk assessment and action plan to the LSMS. 5.3.2 How Action Plans are Followed up The completion of an action plan is the responsibility of the Manager of the area it applies to. The LSMS (and/or Safety Team) will provide assistance to the manager if required. The LSMS will request an update on the action plan near the completion date, and an exception report will be presented initially to the Health and Safety Committee escalated to the Quality and Safety Steering Group and Divisional Quality Group meetings if required. 5.3.3 How Action Plans will be Monitored
Divisional Quality Groups will monitor the progress of each action plan until it has been fully implemented
They provide progress and exception reports to the Quality and Safety Committee who will sign off all action plans
The relevant manager should review each risk assessment action plan as necessary but at least annually. Irrespective of this, re-audits will be scheduled into the annual programme of security related audits and inspections by LSMS and undertaken to confirm improvements have been embedded into current practice
5.6 Buildings not Under the Direct Control of the Trust If the building does not meet the requirements of this policy, the relevant Manager will discuss the matter with the building owners / managers and come to an agreement on how to ensure the building security is adequate to protect Trust staff and property. If an agreement is not possible, the matter is to be reported to the LSMS. Trust staff are to assist the building owners/manager and other occupants to maintain the security of a building at all times. 6.0 Procedures connected to this Policy There are no standard operating procedures currently connected to this policy.
Security Management Policy
Version 1.1 December 2016
15
7.0 Links to Relevant National Standards Compliance with Statutory Direction and Guidance The Trust has a statutory obligation to comply with direction issued through the NHS Standard Contract and guidance issued through NHS Protect. The following information highlight such areas of responsibility.
Standard Criteria
4.1 The NHS Standard Contract
In April 2013 Secretary of State Directions for the provision of security management services for Provider Trusts were formally replaced with revised directions issued through the NHS Standard Contract which directs that the Trust is contractually obliged to implement and maintain the following security management arrangements
Service Condition 24.1 The Provider must put in place and maintain appropriate arrangements to address security management and counter fraud issues.
Service Condition 24.2 Within 1 month following the service commencement date, the Provider must complete an Organisation Crime Profile (OCP), using the appropriate toolkit provided by NHS Protect and in accordance with NHS Protect guidance.
Service Condition 24.3 Following completion of the OCP in accordance with SC 24.2 the Provider must take the necessary action to meet the Standards set by NHS Protect at the level indicated by the OCP
Service Condition 24.4 If requested by the Co-ordinating Commissioner or NHS Protect, the Provider must allow a person duly authorised to act on behalf of NHS Protect or on behalf of any Commissioner to review, in line with the appropriate standards, security management and counter-fraud arrangements put in place by the Provider.
Service Condition 24.5 The Provider must implement any reasonable modifications to its security management and counter-fraud arrangements required by a person referred to in SC 24.4 in order to meet the appropriate standards within whatever time periods as that person may reasonably require.
Service Condition 24.6 The Provider must, on becoming aware of: 24.6.2 - Any suspected or actual security incident or security breach involving staff who deliver NHS funded services or involving NHS resources, report the matter to the Local Security Management Specialist of the relevant NHS Body and to NHS Protect
Security Management Policy
Version 1.1 December 2016
16
Standard Criteria
SC 24.7 On the request of the DoH, NHS England, NHS Protect or the Co-ordinating Commissioner, the Provider must allow NHS Protect or any Local Security Management Specialist appointed by a Commissioner, as soon as is reasonably practicable and in any event not later than 5 operational days following the date of the request, access to:
24.7.1 All property, premises, information (including records and data) owned or controlled by the Provider relevant to the detection and investigation of cases of bribery, fraud or corruption and/or security incidents or security breaches directly or indirectly connected to this Contract; and
24.7.2 All staff who may have information to provide, that is relevant to the detection and investigation of cases of bribery, fraud or corruption, or security incidents and/or security breaches directly or indirectly in connection with this Contract.
NHS Protect guidance issued through Security Management Standards for Providers Part of revised direction issued through NHS Protect also requires all Provider Trusts to implement and comply with a range of security management standards set out in 4 sections covering corporate responsibilities and three other key principles for action, as follows:
1. Strategic governance - sets out the requirements in relation to the strategic
governance arrangements of the organisation to ensure that anti-crime measures are embedded at all levels across the organisation.
2. Inform and Involve - sets out the requirements in relation to raising awareness of crime risks against the NHS, and working with NHS staff and the public to publicise the risks and effects of crime against the NHS.
3. Prevent and Deter - sets out the requirements in relation to discouraging individuals who may be tempted to commit crime against the NHS and ensuring that opportunities for crime to occur are minimised.
4. Hold to Account -sets out the requirements in relation to detecting and investigating crime, prosecuting those who have committed crimes, and seeking redress.
A self-assessment against these standards is undertaken by the LSMS on an annual basis and the outcome of this assessment is submitted to NHS Protect.
NHS Protect may also undertake a full or focussed assessment of compliance with the standards.
Security Management Policy
Version 1.1 December 2016
17
7.1 Links to Relevant National Standards CQC Regulation 15: Premises and Equipment The intention of this regulation is to make sure that the premises where care and treatment are delivered are clean, suitable for the intended purpose, maintained and where required, appropriately located, and that the equipment that is used to deliver care and treatment is clean, suitable for the intended purpose, maintained, stored securely and used properly. Providers retain legal responsibility under these regulations when they delegate responsibility through contracts or legal agreements to a third party, independent suppliers, professionals, supply chains or contractors. They must therefore make sure that they meet the regulation, as responsibility for any shortfall rests with the provider. Where the person using the service owns the equipment needed to deliver their care and treatment, or the provider does not provide it, the provider should make every effort to make sure that it is clean, safe and suitable for use.
7.2 Links to other Key Policies Lone Working Policy This policy aims to provide guidance for managers and individuals, support the development of safe systems of working where the health, safety and well-being of lone workers can be carefully considered within a variety of settings. CCTV Surveillance Policy The purpose of the policy is to provide sufficient guidance so that an assessment can be undertaken to determine whether CCTV is justified and how it should be operated in practice. Risk Management Policy The purpose of the Risk Management Policy is to provide an effective framework through which the Trust can safely and effectively manage risks. Violence and Aggression Policy The purpose of this policy is to detail the Trust’s strategy and legislative compliance in tackling violence and aggression against patients and staff. 7.3 References NHS Business Services Authority - Security Management Service Division
(2004) Security Management Strategy - A professional approach in managing security
in the NHS (2003) NHS Protect website provides further information on managing security:
http://www.nhsbsa.nhs.uk/Protect.aspx NHS Security Management Manual (2008) (Restricted access to Local Security
Management Specialists) Local Security Management Specialist Security Manual: 7th Ed, Wilson J, and
Brooksbank D, 1999, Gower Publishing, Aldershot
Security Management Policy
Version 1.1 December 2016
18
8.0 Roles and Responsibilities for this Policy
Title Role Key Responsibilities
All Employees Adherence - Ensure they are aware of the Security Management Policy and adhere to it - Co-operate with management to achieve the aims, objectives and principles of the Security Management Policy
- Co-operate in observing security measures and combating crime at all levels - Report any suspected breach in security immediately to their manager
- Report all security incidents via the Trust’s Incident Reporting System
- Ensure they are aware of their responsibilities in protecting at all times the assets and property of patients, visitors, colleagues and other Trust users, as well as the safety of the Trust’s assets and property
- Abide by all specific security procedures that exist at all times - Ensure they seek authority from their line manager when removing property belonging to the Trust. Failure to do so could
result in disciplinary action or criminal prosecution as it is an offence to remove property belonging to the Trust without written authority
Local Counter Fraud
Specialist (LCFS)
Specialist Advice
and Investigation - Determine the need for a police investigation where there has been a financial security breach or fraud - Undertake separate investigation to identify the weaknesses in physical security procedures at the Trust
Service Managers Operational - Ensure statutory Health and Safety requirements are complied with
- Monitor and review performance in connection with this policy
- Ensure departmental security issues are reported to and from the Group Managers - Record any significant hazards and implement appropriate control measures identified which are both reasonable and
practical to either remove or reduce the hazards to an acceptable level. This procedure to be undertaken as part of the monthly health and safety checklist
- Ensure risk assessments are undertaken annually (see Appendix 1) and actions implemented to ensure that staff continue
to work within a safe environment and the security of the building is maintained (support requested via the LSMS) - Ensure unmanageable/significant risks are escalated via the risk register process
- Ensure the incident reporting process is followed - Ensure post incident care and support is afforded to those affected by violence and aggression incidents or affected by a
criminal act
- Ensure appropriate systems for alerting staff and others following an incident of identified risk are in place - Ensure incidents of theft, criminal damage, break-ins, inappropriate access into buildings are investigated and key staff
involved, such as the Local Security Management Specialist - Ensure local workplace induction is attended by all new staff members
Security Management Policy
Version 1.1 December 2016
19
Title Role Key Responsibilities
Group Directors, Group Managers and Heads of
Service
Implementation - Ensure security and the safety of patients, visitors and staff are reflected in all appropriate group procedures and guidance; which require regular monitoring, review and updating as necessary
- Engage with the LSMS to identify, categorise and resolve security risks within their areas - Ensure action plans are developed by managers and progressed for mitigating identified security risks
- Demonstrate and promote a pro-security culture across their area of responsibility
- Ensure that appropriate action is taken in respect of persons who are suspected of committing a criminal offence, misconduct or other breaches of security in contravention of the policies of the Trust
- Ensure that all security incidents are reported in accordance with the Trust Incident Reporting Policies and that staff are fully supported following any incident
- Ensure that regular liaison/communication between the Trust and Police is maintained at appropriate levels, involving the
LSMS where support is required - Ensure procurement and ongoing management of security related contracts such as security guarding or CCTV are
managed in accordance with relevant policies and guidance and that they engage with the Estates Department before authorising the purchase of security systems and equipment
Local Security Management Specialist
(LSMS)
Implementation Lead
- Provide the professional skills and expertise to tackle security management issues within the Trust - Exercise specific responsibilities on behalf of the Security Management Director of any impact resulting from new legislation
or national directions/guidance - Offer site security and crime prevention advice, support and assistance in upholding and developing operational
arrangements that affect security
- Work closely with the Local Counter Fraud Specialist where an internal investigation has highlighted internal/procedural security weakness
- Review all security incidents and where necessary include a location visit in the program of site security survey visits - Liaise with external agencies regarding non-clinical security matters e.g. Police, Crown Prosecution Service, and NHS
Protect Legal Protection Unit - Liaise with the local police in the event of a security related incident to assist with any investigation
- Assist managers to carry out risk assessments to highlight any security related weaknesses
- Undertake a programme of security survey visits, to examine all aspects of building and procedural security (in line with template Security and Crime Reduction Risk Assessment Appendix 2)
- share the findings of any security risks that have been identified with the managers of the service and discuss recommendations for each action
- Develop action plans as a result of the recommendations/ findings from any risk assessments
- Monitor the progress of the improvements in security as outlined in the action plans developed
Health and Safety
Committee
Responsible - Monitor the effectiveness and overall compliance in meeting statutory obligations and practicalities of providing a safe and
secure environment that protects patients, staff, visitors, their property and the physical assets of the organisation so far as is reasonably practical. Membership includes senior representatives from the three operational groups of mental health,
learning disabilities and children and young people’s services
Security Management Policy
Version 1.1 December 2016
20
Title Role Key Responsibilities
Quality and Safety Committee
Monitor - Ensure that security management is managed efficiently and effectively in accordance with the Board’s Assurance Framework and strategic priorities. The Committee has delegated responsibility for ensuring that security management is
managed efficiently and effectively to the Health and Safety Committee - Receive progress and exception reports from the Health and Safety Committee
Group Management
Boards
Scrutiny and
Performance
- Receive audits, reports and recommendations from the Health and Safety Committee on all security related matters
relevant to their group - Monitor performance and implements strategies to provide a safe and secure environment that protects patients, staff and
visitors and their property as well as the physical assets within their group
- Provide progress and exception reports to the Quality and Safety Committee
Trust Board Strategic - Have a strategic overview and final responsibility for a safe environment in which the uninterrupted delivery of quality
health care can be delivered
Executive Director of
Nursing, AHPs and Governance
Executive Lead - Designated Security Management Director in accordance with the requirement for all NHS Trusts to appoint a Board
Executive Director to take responsibility for this role - Ensure compliance with the Secretary of State Directions on tackling violence against staff and professionals who work in,
or who provide services to, the NHS in accordance with the provisions of the NHS Standard Contract 2012/13 - Lead on all aspects of security management
Chief Executive Accountable - Ensure that this policy is implemented within the Trust (operational responsibility has been delegated to Executive Director
of Nursing, AHPs and Governance)
Security Management Policy
Version 1.1 December 2016
21
9.0 Training
What aspect(s) of this policy will
require staff training?
Which staff groups require this
training?
Is this training covered in the Trust’s Mandatory and Risk
Management Training Needs Analysis document?
If no, how will the training be delivered?
Who will deliver the training?
How often will staff require
training
Who will ensure and monitor that staff have
this training?
Security Management
In-patient staff No, staff will receive specific training in relation to this
policy where it is identified in their individual training needs
analysis as part of their
development for their particular role and
responsibilities
Internally Local Security Management
Specialist
This will be determined on
an individual basis
Health and Safety Committee
10.0 Equality Impact Assessment Black Country Partnership NHS Foundation Trust is committed to ensuring that the way we provide services and the way we recruit and treat staff reflects individual needs, promotes equality and does not discriminate unfairly against any particular individual or group. The Equality Impact Assessment for this policy has been completed and is readily available on the Intranet. If you require this in a different format e.g. larger print, Braille, different languages or audio tape, please contact the Equality & Diversity Team on Ext. 8067 or email [email protected] 11.0 Data Protection and Freedom of Information
This statement reflects legal requirements incorporated within the Data Protection Act and Freedom of Information Act that apply to staff who work within the public sector. All staff have a responsibility to ensure that they do not disclose information about the Trust’s activities in respect of service users in its care to unauthorised individuals. This responsibility applies whether you are currently employed or after your employment ends and in certain aspects of your personal life e.g. use of social networking sites etc. The Trust seeks to ensure a high level of transparency in all its business activities but reserves the right not to disclose information where relevant legislation applies.
Security Management Policy
Version 1.1 December 2016
22
12.0 Monitoring this Policy is Working in Practice
What key elements will be monitored?
(measurable policy objectives)
Where described in
policy?
How will they be monitored?
(method + sample size)
Who will undertake this
monitoring?
How Frequently?
Group/Committee that will receive and
review results
Group/Committee to ensure actions
are completed
Evidence this has
happened
Completion of the annual security risk assessment and
completion of LSMS crime reduction survey
5.0 Summary report detailing security issues
investigated and recommended actions
Local Security Management
Specialist
Annually Health and Safety Committee
Quality and Safety Steering Group
Minutes of meetings/
action plans signed off
How the organisation risk assesses the physical
security of premises and assets
Appendix 1 Security Audit and inspection – security risks
to be reflected in group/ Trust risk register as
appropriate
Local Security Management
Specialist
Annually Group Quality and Safety Steering
Groups
Group Quality and Safety Steering
Groups
Minutes of meetings/
action plans signed off
How action plans are developed as a result of risk
assessments
4.2/ 4.2.1/ 4.2.2 Audits, reports and recommendations of all
security risk assessments
Local Security Management
Specialist
Monthly Health and Safety Committee
Group Management Boards
Minutes of meetings/
action plans
signed off
Security Management Policy
Version 1.1 December 2016
23
Appendix 1: Building /Ward Security Risk Assessment
Area/Department:
Site: Date: Review date:
Risk Assessor(s):
Role/designation:
Introduction: It is the policy of the Trust that formal regular periodic premises security inspections / security risk assessments are carried out by Managers to comply with the Minimum Standards under the Workplace Health and Safety at Work (WHSW) Regulations for all areas where Trust staff are based. All managers will complete the security risk assessment for their building / area and if required create an action plan of work to address deficiencies. The manager is responsible for the completion of the tasks within the action plan.
Question Yes No Further Action Question Yes No Further Action
Internal Procedures
1. Explanation of what your service is and what it does
8. Does the building have a local security process in place and are all staff locally inducted and records of training kept?
2. Explanation of how the building / office is secured at night
9. Do all staff have and wear ID Badges with appropriate levels of access controls?
3. Explanation of how the premises is open each morning
10. Is a record kept of all people who sign out keys /fobs or temporary ID Cards?
4. Is CCTV fitted and who controls request /release of recordings?
11. Are all staff aware of what the lockdown and emergency planning procedures are?
5. Does the building or ward have a booking in and out Process?
12. Are all staff trained in fire evacuation procedures and do you have appointed Fire Wardens?
6. Do staff feel safe and secure whilst going to and from car park to work place?
13. Have all staff been made aware of the Lone working process and lone working policy and records kept?
7. Are premises externally & internally well lit?
14. Do all staff have somewhere lockable to secure their personal possessions?
Security Management Policy
Version 1.1 December 2016
24
Question Yes No Further Action Question Yes No Further Action
Internal Procedures and Processes
15. Are procedures in place to stop security access cards/fobs being taken off wards and forensic sites?
22. Are all staff made aware not to allow anyone access to restricted areas who do not have identification and not readily recognised?
16. Where the building has a key cabinet is the cabinet locked and staff made aware of key location?
23. Where buildings are fitted with access buzzers / videx / phones are staff who give access suitably trained and records kept
17. Can patients in communal areas be easily observed by staff without being obtrusive and maintaining some privacy?
24. Are all Patient / Staff identifiable documents kept in locked cabinets or rooms?
18. Are external agencies that use the building / meeting rooms given security brief on how to leave room / building at end of business?
25. Have you completed a lone working risk assessment for your staff and have you shared the assessment with them?
19. Have carried out an environmental safety inspection of this work area within the last 12 months
26. Is there clear view of all areas of the corridors and public areas to prevent ‘blind’ areas where attackers may hide?
20. Have all issues identified in the environmental inspection been addressed. If no what actions are still outstanding?
27. Are documents containing personal information (medical records, staff data etc.) secured away from service users and visitors?
21. Do reception staff have a system of summoning assistance to manage a violent incident and is this system tested?
28. Is there adequate visibility allowing persons accessing building/ward to be seen?
Security Management Policy
Version 1.1 December 2016
25
Question Yes No Further Action Question Yes No Further Action
Management of Violence and Aggression
29. Has a violence and aggression risk being completed for your service area?
39. Explain what system are in place for staff to summon assistance to manage a violent incident
30. Explanation of the clinical profile and risk factors of patients cared for within your service / ward
40. Are staff provided with and trained in use of personal attack alarms?
31. Explain how this type of patient is suitable to be cared for on this ward?
41. Have details of this training been recorded and available on request
32. Explain how staff are qualified to work on your ward?
42. Explain how staff are made aware of risk assessments and care plans
33. Explain how staff are provided with information about patients who can become violent /aggressive?
43. Explain how contents of risk assessment and care plans shared with staff working on wards?
34. Explain how staff supervised on wards?
44. Do you conduct handover procedures at the end/start of each shift and are these recorded?
35. Explain how patients with history of aggression are managed/ cared for/supervised?
45. Explain in relation to violence and aggression what safety issues are discussed at handover?
36. Explain what happens to a patients care plan following an assault to staff or other patients?
46. Explain how staff made aware of the levels of observation required for patients in their care?
37. Explanation of the debrief or discussion following incidents of attacks on staff so others might avoid a future occurrence
47. Explain how clinical staff are involved in developing a patient risk assessments?
38. Explain how staffing levels are maintained on the ward and are there any issues?
48. Explain how are staff kept fully briefed on patients clinical risk factors?
Security Management Policy
Version 1.1 December 2016
26
Question Yes No Further Action Question Yes No Further Action
Management of Violence and Aggression
49. Are the decorations (wall paper, paint colour, pictures, plants, ornaments etc.) conducive to a relaxing environment?
53. Have all staff completed MAPA training
50. Are there regular activities provided for service users to relieve boredom?
54. Is the noise kept to a level conducive with relaxation and comfort (consider intermittent noise such as squeaky doors, rattling trolleys, staff talking etc.)
51. Are all dangerous implements (kitchen utensils, scissors, sharp objects etc.) secured away from service users and visitors?
55. Explanation and numbers of any security breaches within your department during the past 12 months
52.Do Estates staff have swipe card access on to your ward? (if yes immediately contact Helpdesk and have this level of access deactivated)
56. Do contractors have swipe card access on to your ward? (if yes immediately contact the helpdesk and have this level of access deactivated)
Note: 1. Only clinical staff working on wards are authorised to have direct access on to wards by use of access control swipe cards. 2. Non-clinical staff and contractors who want to enter a ward for the purpose of carrying out inspections etc will only gain access by pressing the buzzer and booking onto the ward. 3. At all times non-clinical staff entering a ward will be accompanied by ward staff for their own safety.
Security Management Policy
Version 1.1 December 2016
27
Action Plan
N0 Identified Issues How staff / patient affected Remedial Action Responsible person
Required action date
Date completed
1
2
3
4
5
Review Dates: (Annually or within one month of any security breach /changes to security procedures or introduction of new legislation)
Review/Assessment date: Name: Reason for review
Review/Assessment date: Name: Reason for review
Review/Assessment date: Name: Reason for review
Security Management Policy
Version 1.1 December 2016
28
Appendix 2: Security and Crime Reduction Risk Assessment
N.B. Completion by the LSMS only
Location Details:
Directorate
Department Manager
Location
Type of facility:
Date and type of last Assessment
Assessment conducted by
Date of assessment
Serial
(a)
Heading/Sub Heading
(b)
Requirement
(c)
Comment/Observation
(d)
Inspection Recommendation (e)
A
1
List recommendations from the previous assessment that have not been completed.
2 Details of incidents since last inspection No & Type SI’s No & Type other incidents
3 List any recommendations from SI reviews that have not been completed
Security Management Policy
Version 1.1 December 2016
29
N0 (a)
Criteria (b)
Requirement (c)
Comment/Observation (d)
Inspection Recommendation (e)
4 External environment: Fencing Gates
Is environment well maintained? Details of the perimeter fence in place? Is it appropriate to the location of the site and the assets it protects? Are the gates on the perimeter constructed to the same standard as the fence?
5 Doors and Locks Do external doors meet required standard
6 Lighting Is lighting effective? Are there any areas that require additional lighting?
7 Glazing Is glazing to an appropriate standard or protected by Anti Shatter Film (ASF)?
8 Car parking Car parking available? Does Car park meet Park Mark standard? Is access to Car park controlled? Issues related to damage/theft of/from vehicles.
9 Reception Is access to reception controlled? Is desk suitable? Are screens in place? Is Furniture appropriate Is access from reception controlled? Are toilets available in reception area Is there interview room accessible from reception without need to enter remainder of facility?
10 CCTV: Is CCTV installed or planned? Is the Operational Requirement (OR) available? When the OR was last reviewed? Does the system meet the OR?
Security Management Policy
Version 1.1 December 2016
30
Serial
(a)
Heading/Sub Heading
(b)
Requirement
(c)
Comment/Observation
(d)
Inspection Recommendation (e)
11 Intruder Detection Systems
Is IDS installed? Is the Operational Requirement available? The OR was last reviewed? Does the system meet the OR? Is system monitored? Police Response?
12 Staff Alarms Type? Is the Operational Requirement available? When the OR was last reviewed? Does the system meet the OR? Is system monitored? Details of Response
13 Automated Access Controls (AACS)
Is AACS in place or planned? Is the Operational Requirement available? When the OR was last reviewed? Does the system meet the OR? DPA Compatible? Business Continuity Issues addressed?
14 Access Control Are Mechanical Key Code Locks in use? Process for changing code Approx. date of last change Are other Access Control measures in place? Describe them.
15 Key Control
Instructions Key Registers Issue Return Out of hours Key Holding arrangements Start Work/cease work arrangements
Security Management Policy
Version 1.1 December 2016
31
Serial
(a)
Heading/Sub Heading
(b)
Requirement
(c)
Comment/Observation
(d)
Inspection Recommendation (e)
16 Visitors/book/process Is a Visitors’ Book maintained at the point of entry?
17 Escorting requirements
Are all visitors who do not hold acceptable credentials escorted to and from the person with whom their business is to be conducted? Are visitors given temporary identification badges?
18 Security Guarding/patrolling
Security Guarding activity? Assurance re Licensing? Guards present? If so what hours? Location of patrol logging points Contact details of security patrol held? Regular reports received? Issues with security guards?
19 Personal Property/Lockers
Are adequate arrangements in place for security of staff personal property?
20 Are adequate arrangements in place for security of patients’ personal property?
21 Staff only areas Is access to staff only areas adequately controlled?
22 Contraband Are processes in place for securing contraband items until discharge/ disposal of items if appropriate
23 Waste Disposal If confidential waste disposal contracts are in place is activity monitored? How is the disposal of magnetic and other media organised?
Security Management Policy
Version 1.1 December 2016
32
Serial
(a)
Heading/Sub Heading
(b)
Requirement
(c)
Comment/Observation
(d)
Inspection Recommendation (e)
24 Reception/Post Room Measures
Are staff aware of issues related to the receipt of suspicious packages? Adequate procedures for security of inbound/outbound post.
25 Reception/Post Room Measures
Are staff aware of issues related to the receipt of suspicious packages? Adequate procedures for security of inbound/outbound post.
26 Security of CD’s and other medications
Are adequate procedures in place for securing CD’s? Are adequate procedures in place for securing other medication? Are adequate procedures in place for accounting for / securing prescription pads?
27 Security Training Approx. number of staff who have attended CRT/PSTS/MAPA Training
28 Security Awareness Assess level of security awareness among staff.
29 Asset Register Is there an Asset Register? Does it contain the sufficient detail
30 Asset Protection Are sufficient steps taken to protect assets?
31 Loss/compromise Are business continuity aspects of loss/compromise considered?
32 Security Awareness Assess level of security awareness among staff
33 Lone Working Guidance
Are staff aware of Lone worker guidance
34 Are adequate controls in place to monitor location / welfare of staff working in community
35 How are staff working in community supported in event of a problem?
36 Do staff have access to remotely monitored alarm systems?
Security Management Policy
Version 1.1 December 2016
33
Serial
(a)
Heading/Sub Heading
(b)
Requirement
(c)
Comment/Observation
(d)
Inspection Recommendation (e)
37 Are interview Rooms furnished/equipped appropriately
Alarms fitted/accessible? Furniture and fittings kept to minimum? Anti-barricade doors fitted? Vision panels in doors
38 Is there adequate liaison with:
Community Safety Bureau/ Community/Neighbourhood Officers Local command team
39 Are there local arrangements in place for
Information sharing? Requesting assistance on planned basis?
Action Plan
N0 Identified Issues How staff / patient affected Remedial Action Responsible person
Required action date
Date completed
1
2
3
4
Review Dates: (Annually or within one month of any security breach /changes to security procedures or introduction of new legislation)
Review/Assessment date: Name: Reason for review
Review/Assessment date: Name: Reason for review
Review/Assessment date: Name: Reason for review
LSMS Name:_____________________________________________________________________ LSMS signature: _________________________________________________________________ Date completed:__________________________________________________________________
Security Management Policy
Version 1.1 December 2016
34
Appendix 3: Contacts for Security Incident and Advice
Internal:
Head of Health and Safety - 0121 612 8015 / 8168 Local Security Management Specialist – 0121 612 8015/ 8168 External: POLICE:
For all Emergencies : Sandwell Sarah Smyth – Sandwell Partnership Sergeant – 101 #811 3051/2 [email protected] Steve Thompson – Sandwell Partnership Officer – 101 #811 3051/2 [email protected] – forensic history requests Lillie Abbott – Sandwell Anti-Crime Co-ordinator – 101 #811 3051/2 [email protected] Wolverhampton Corrina Griffiths – Wolverhampton Partnership Inspector – 101 #871 3299 [email protected] Keely Gibbs – Wolverhampton Partnership Officer – 101 #871 3278 [email protected] Kelly Hale – Wolverhampton Partnership Officer – 101 #871 3302 [email protected] – forensic history requests Counter Terrorism Unit Richard Holder – Prevent Officer – 07789 895718 [email protected] Lisa Bird – Prevent Sergeant – 07825 112401 [email protected] Triage Car Lee Davies – Triage Car Sergeant - 07876 216650 / 101 #871 3029 [email protected]
Security Management Policy
Version 1.1 December 2016
35
Policy Details
* For more information on the consultation process, implementation plan, equality impact assessment, or archiving arrangements, please contact Corporate Governance
Review and Amendment History
Version Date Details of Change
1.1 Dec 2016 Policy amended to reflect changes in systems and procedures and new policy format; Amendments to ‘suspicious Items’ 4.26, in line with police protocols
1.0 Dec 2012 New policy for BCPFT; alignment of policies following TCS
Title of Policy Security Management Policy
Unique Identifier for this policy BCPFT-SEC-POL-03
State if policy is New or Revised Revised
Previous Policy Title where applicable n/a
Policy Category Clinical, HR, H&S, Infection Control etc.
Security
Executive Director whose portfolio this policy comes under
Executive Director of Nursing, AHPs and Governance
Policy Lead/Author Job titles only
Local Security Management Specialist
Committee/Group responsible for the approval of this policy
Health and Safety Committee
Month/year consultation process completed *
November 2016
Month/year policy approved December 2016
Month/year policy ratified and issued December 2016
Next review date December 2019
Implementation Plan completed * Yes
Equality Impact Assessment completed * Yes
Previous version(s) archived * Yes
Disclosure status ‘B’ can be disclosed to patients and the public