Security Management

35
Version 1.1. December 2016 Security Management Target Audience Who Should Read This Policy All Trust staff including agency, temporary and locum staff

Transcript of Security Management

Version 1.1. December 2016

Security Management

Target Audience

Who Should Read This Policy

All Trust staff including agency, temporary and locum staff

Security Management Policy

Version 1.1 December 2016

2

Ref. Contents Page

1.0 Introduction 4

2.0 Purpose 4

3.0 Objectives 4

4.0 Security Arrangements and Procedures 4

5.0 How the Trust risk Assesses the Physical Security of Premises and

Assets 13

6.0 Procedures connected to this Policy 14

7.0 Links to Relevant National Standards 15

7.1 Links to Relevant National Standards 17

7.2 Links to other Key Policies 17

7.3 References 17

8.0 Roles and Responsibilities for this Policy 18

9.0 Training 21

10.0 Equality Impact Assessment 21

11.0 Data Protection and Freedom of Information 21

12.0 Monitoring this Policy is Working in Practice 22

Appendices

1.0 Building /Ward Security Risk Assessment 23

2.0 Security and Crime Reduction Risk Assessment 28

3.0 Contacts for Security Incident and Advice 34

Security Management Policy

Version 1.1 December 2016

3

Explanation of terms used in this policy

Assets - Irrespective of value, assets are defined as the materials and equipment used to deliver NHS

healthcare. In respect of staff and patients it can also mean the personal possessions they retain whilst working in, using or providing services to the NHS

Local Security Management Specialist (LSMS) - The role of the Local Security Management Specialist is to deliver security management work locally in accordance with National Statutory

Direction and guidance issued through the Trust and NHS Protect

Lock Down - The process of controlling the movement and access - both entry and exit - of people (NHS patients, staff, or visitors) around a Trust site or other specific Trust building/area in response to

an identified risk, threat, hazard that might impact on the security of patients, staff, visitors or assets

or, indeed, the capacity of that facility to continue to operate

NHS Protect - Formerly NHS Counter Fraud and Security Management Service it has overall responsibility for all policy and operational matters related to the management of security in the NHS

Property - Property is defined as the physical buildings in which NHS staff work, where patients are treated from and where the business of the NHS is delivered

Security - The protection of assets of all kinds against loss from theft, fire, fraud, criminal acts or

other injurious sources

Standard - A published document that contains a technical specification or other precise criteria

designed to be used consistently as a rule, guideline, or definition. All standards take the form of either: specifications, methods, vocabularies, codes of practice or guides

Datix - Name of the Trust’s electronic Incident Reporting System

Security Management Policy

Version 1.1 December 2016

4

1.0 Introduction It is recognised that crime against NHS can have a serious impact on everyone who works within or uses its services. All of those working in the Black Country Partnership Foundation NHS Trust have a responsibility to be aware of these issues and play an active role in managing the risks related to criminal activity and breaches of security. The Trust is committed to providing a safe and secure environment that protects patients, staff and visitors, their property and the physical assets of the organisation so far as is reasonably practical. This policy is part of the Trust’s commitment to managing its risk agenda and sets out the responsibilities and arrangements in place to realise this commitment. 2.0 Purpose The purpose of this policy is to detail the Trust’s strategy/legislative compliance in maintaining a safe working environment, and safe and secure healthcare premises. 3.0 Objectives Identify organisational and individual responsibilities in the management of

Trust, personal and patient property Identify good practice principles on how to assess and reduce the risk of

damage and loss Ensure employees are aware and provided with suitable support in raising

security awareness Recognise the importance of recording and monitoring of adverse incidents in

line with local and national frameworks Develop a partnership with local agencies, e.g. police and local authorities for a

safe and secure trust environment 4.0 Security Arrangements and Procedures 4.1 Resolving Security Management Matters in the First Instance Security management matters should be discussed directly with managers as safety and security will always be an essential and integral function of management. If the matter is unresolved or more specialist advice is required issue should be raised with the Local Security Management Specialist (LSMS) or a member of the Health and Safety Team. The Trust will always endeavour to reduce the impact that crime and security related matters may have on patients, staff and visitors and will always aim to identify solutions and prioritise resources to address identified issues. 4.2 Management of Routine Security Issues The Local Security Management Specialist is responsible for the routine management of non-clinical security issues; with the exception of information systems security. The LSMS will exercise specific responsibilities on behalf of the Security Management Director (SMD). Key Responsibilities of the LSMS are:

Security Management Policy

Version 1.1 December 2016

5

Crime Prevention Advice, support and assistance in upholding and developing operational arrangements that affect security

Review all security incidents and ensure non-clinical security risk assessments and crime reduction surveys are conducted in all Trust properties

Liaise with external agencies regarding non-clinical security matters e.g. Police, Crown Prosecution Service, NHS Security Management Service Legal Protection Unit

Advise Executive directors of any impact resulting from new legislation or national directions / guidance

4.3 Incident Reporting Reporting incidents is important, whether actual, injury or a ‘near miss’ occurs. Please refer to Incident Reporting Policy for more detailed guidance. All security related incidents, e.g. episodes of violent, aggressive and unacceptable behaviour, must be recorded on Datix. All security related incidents will automatically be brought to the attention of the LSMS via the Datix system, for further investigation. The Datix system, once compatible, will be reporting direct to NHS Protect via the Security Incident Reporting System (SIRS), all security related incidents (e.g. physical assaults, threatening behaviour, and criminal damage). 4.4 Identification Badges All Trust staff will be issued with an Access Control Identification Badge containing their personal details, current photograph and their role which must be worn whilst on duty at all times. 4.5 Control and Issuing of Identification Badges and Security Access/Swipe Cards The Trusts Estates department with Human Resources (HR) are responsible for all aspects of controlling and issuing identification badges and security access/swipe cards centrally from the Trust Headquarter and will ensure:

That ID badges and security access passes are only issued from the designated points Delta House and Penn Hospital

That HR provides monthly updates to Estates of personnel who have left the Trust to enable the deactivation of cards and removal of names from the systems data base

That no contractor or non clinical staff is provided with a security access card onto any ward

Refer to the Trust Policy and procedures on Electronic Door Access Control 4.6 Security of Trust Buildings and their Contents Buildings within the Trusts control, either owned or leased are provided with a means of access control whether it is keys, combination locks, fobs, swipe card.

If the building has a public access area such as a foyer or corridor, then access control is to ensure that non-public areas are secure

All buildings will be provided with an intruder alarm system

Vulnerable areas of buildings are to be reasonably covered by external lighting

Security Management Policy

Version 1.1 December 2016

6

Consideration will be made of the level of security required for ground floor i.e. doors and windows based on the value of the contents and the cost of measures such as bars and grills if appropriate

All buildings are to be left locked and secure, with appropriate security systems activated, access doors and gates locked and keys returned to relevant key holding areas

All staff are to be aware of the security of the building and their role in maintaining the security

4.7 Access Control Measures – Inpatient Wards The Trust believes that safeguarding the welfare of adults and children from abuse is paramount: the safety of patients, staff and visitors is also our utmost priority. In recognising our responsibilities and duty of care to ensure provision of safe and secure environments inpatient wards are secured to restrict access to only the necessary staff members. The Trust recognises that those patients admitted to Mental Health wards have complex, specific and individual needs. The locking of ward doors is intended to protect patients from self-harm, suicide, accidents or inflicting harm on others. This extends to protecting our patients and staff from others gaining access to the wards. This approach is compliant with the Mental Health Act, Code of Practice (Chapter 16).

Access points to all inpatient wards are locked (magnetically) with only relevant staff having access to these areas

The staff groups with access will be agreed by management and ID cards will be updated accordingly

4.8 Access to Wards by Non-Clinical Staff/ Contractors

Staff who are not contracted to work on any inpatient ward will not be issued with an access passes to any ward. All other staff who require access to the ward environment will do so by prior arrangement /agreement from ward staff

Contractors will not be issued with an access pass onto any ward and will only gain entry by prior arrangement with Estates and the relevant ward manager

All other staff/ contractor entering a ward environment for any reason at all times must sign in/ out of the ward and must be escorted/supervised by a ward member of staff at times

This safeguard will ensure staff and contractors do not inadvertently intrude upon situations that could compromise their safety or the privacy and dignity of patients. 4.9 Personal Security of Staff The Trust has taken a number of measures to protect the personal security of its employees which include:

The installation of security and panic attack alarms systems where a need has been identified

Use of CCTV in areas that have been identified as high risk

Issuing of mobile phones to lone workers

Installation of appropriate lighting and fencing to external areas

Provision of Management of Potential Aggression and Promoting Safer Therapeutic Services (PSTS) Training to staff

Security Management Policy

Version 1.1 December 2016

7

The adoption of a zero tolerance approach in relation to acts of theft, vandalism or assault

4.10 Personal Alarms/ Static Alarms In line with the Lone Working Policy, lone working risk assessments should be undertaken by the manager to highlight whether a personal alarm should be issued to the staff member where there is a level of risk to staff safety. This is particularly relevant to those staff that work in the Community. Please refer to Lone Working Policy for more detailed guidance. Static alarm buttons should be located in interview/ reception areas, if personal alarms are not available to staff. There should be a prompt response when the alarm is activated and the police called where it is deemed that a police presence is required. Staff should notify their manager, and where appropriate involve the LSMS; if they believe there are unmanaged security risks to staff safety. 4.11 Security of Personal Property (Staff) All staff are responsible for the safety and security of their personal possession at all times whilst at work and must comply with the following:

Avoid bringing valuables in to work

Avoid leaving money in office draws

Use security lockers where provided 4.12 Security of Service Users’ Property Loss of property can cause great inconvenience and stress to service users and can also lead to mistrust among staff. Service users should be persuaded, where possible, not to bring valuable items or large sums of money onto the premises. Where property is handed over for safe keeping this should be recorded and secured in accordance with the procedures specified in the Trusts Procedure for the handling of patients money and property. Refer to the Trust policy on handling/safeguarding patients’ monies and property. 4.13 Lost and Found Property Service users, staff and visitors need to understand that the Trust take lost property seriously. All lost property incidents are to be investigated at ward/department level in the first instance and reported on DATIX. Should it be identified that an employee of the Trust was responsible for the loss, staff are to seek advice from their manager regarding compensation for the loss. Any found property is to be handed into the local general office or reception for safe keeping. 4.14 Cash Handling/Petty Cash Where cash is handled on behalf of the Trust and/or patients, managers must ensure that any risks associated with this activity are assessed and appropriate control measures implemented accordingly.

Security Management Policy

Version 1.1 December 2016

8

Procedures for handling of cash must be in line with Trust policies and procedures. Any discrepancies in cash should be reported immediately. Minimum control measures are:

Two people must be present when cashing up and preparing cash for banking

Cashing up and preparing money for banking should not take place in view of the public

Cash must be stored in a locked safe that is secured to the floor/wall until banking takes place

At least two people must escort the money to the safe

Banking should be carried out regularly by contracted services

Wards and departments are to hold only the minimum amount of cash that is necessary, and this is to be held in accordance with Trust policies and procedures

If required managers are responsible for ensuring that they have enough staff who are authorised signatories to enable service user banking to take place

4.15 Fraud Fraud is a serious offence and diverts Trust funds from providing the best possible quality health care. A Local Counter Fraud Specialist has been appointed by the Trust to tackle counter fraud and corruption. All allegations of fraud are taken seriously by the Trust and offenders face both disciplinary action and prosecution. The Trust’s Standing Financial Instructions must be strictly followed at all times. Any indications or suspicions relating to fraud should be immediately reported to the Local Counter Fraud Specialist. Please refer to the Anti-Fraud, Bribery and Corruption Policy for more detailed guidance. 4.16 Drug/ Medicine Security All medicines issued must be stored in a locked cupboard that conforms to British Standards either BS3621 or BS2881.

Medicine trolleys must be secured to the wall, except during the medicine round; they must only be used for medicines in current use, but not controlled drugs

The trolley must not be left unattended during the medicine round

If trolleys are not used, a separate section of the storage cupboard should be designated for medicines in use

Pharmacy boxes for the transportation of medicines are to be locked at all times when containing medicines except during packing and unpacking of the contents and their transfer to the ward/clinical area medicine cupboards

Each patient involved in a self-administration of medicines scheme must have a lockable receptacle (e.g. drawer), which is not readily portable

4.17 Storage and Management of Controlled Drugs

Controlled drugs must be stored in a locked cupboard that meets the Misuse of Drugs Safe Custody regulations 1973, reserved solely for this purpose (this must not be a medicine trolley)

The controlled drugs key is the responsibility of the nurse in charge and should be kept on their person and stored separately from other drug keys

Security Management Policy

Version 1.1 December 2016

9

A controlled drug register must be maintained and kept locked in a secure place when not in use

4.18 Security in Transit

All Trust employees transporting medicines must carry their Trust identification badge during the transport. This should be shown if requested by a patient, or any other person with reason to check the identity of the employee

Approved bags, not identifiable as containing medication but preferably marked on the inside with the Trust name and address must be used to carry medication. This includes stocks from the team base for patient administration, and pharmacy dispensed prescriptions for delivery to patients’ homes

Packages including ward boxes must not be left unattended. Delivery vans must be locked when unoccupied

The Policy for the Safe and Secure Handling of Medicines must be followed at all times. 4.19 Security of Keys

The Manager for any department or ward which has key security systems is responsible for ensuring that it is kept locked at all times

All keys / fobs and access devices must be signed for from the issuing person and returned and signed back in within the stated timeframe

All keys / fobs and access devices held on wards must be signed out/in during handover and shift changes

The managers will maintain an up to date log of keys/fobs and access devices signed out and carry out weekly checks to ensure items are being accounted for

Any access item found to be deficient during handover is to investigated and reported on DATIX

Under no circumstances should security keys/access fobs or swipe cards be removed from any ward or Trust premises

For new premises, keys will be issued to cover staffs requirements. The control of keys is then the responsibility of the Manager and replacements will have to be funded from department budgets

New keys will only be supplied when locks are found to be defective or exchanged

When staff leave the Trust or move to another department the Manager must retrieve any keys, fobs and other security devices held by the staff member

4.20 Car Parking and Vehicle Security Car parking must be confined to the designated areas which are all provided with lighting. Staff should lock their vehicles and security devices, where fitted, should be activated. “The Trust will not accept any responsibility for thefts from or damage to vehicles whilst they are on Trust property” Vehicle Security:

Staff should lock their vehicles, and security devices, where fitted, should be activated

Trust vehicles must be locked and the security devices/alarm as fitted are activated at all times when the vehicle is to be left unattended

Security Management Policy

Version 1.1 December 2016

10

Lease car drivers must, when parked, lock their vehicle and activate the security device/alarm in accordance with the Lease Car Users Regulations for Employees and Trust Lease Car Scheme Principles and Conditions

Where possible all personal items and any Trust property should be removed from view in the vehicle when it is left unattended, thus limiting the possible risk of theft and damage to the vehicle

4.21 Closed Circuit Television (CCTV) The operation of CCTV systems at the Trust is in line with the Data Protection and Human Rights Act. Access to images is restricted unless in support of crime detection or at the request of statutory bodies provided that all Data Protection protocols are observed. Please refer to CCTV Surveillance Policy for more detailed guidance. 4.22 Arrangements for Lock Downs A Lock Down is a process that allows staff to assert or regain control of a situation that appears or escalates with little warning. In securing all or part of the premises against individual entry, staff, through the implementation of lock down, can gain some breathing space, while providing short-term protection to themselves and their patients. Examples of the types of incident that necessitate lock down are:

Contamination incident in the local area that may lead to people/ patients self-presenting at Accident and Emergency Department

Self-presenting patients who are suspected of suffering from chemical/ biological/ radiological/ nuclear contamination

Gang-related conflicts, weapons, identified shooters on premises

Bomb alerts/ terrorist attack, terrorist threats Risk profiles need to be completed by each site manager with support and advice as necessary from LSMS, Estates, Health and Safety, Fire Safety Officer, Governance Assurance Unit and Human Resources. Please refer to the Lockdown Policy for more detailed information and guidance on lock down risk profiles. 4.23 Locking up Procedures Locking up procedures undertaken by the Contract Security team is in place at specific Trust location. However where this not applicable all employees must ensure of the following actions:

Ensure that offices are secured by locking the door and closing all windows

Ensure that all access / exit doors are closed and where intruder alarms are fitted that they armed before leaving the building

Where security gates are fitted ensure that they are closed and locked In addition issues relating to the effectiveness of locking up procedure affecting the safe environment should be brought to the attention of the line manager with responsibility for that building.

Security Management Policy

Version 1.1 December 2016

11

4.24 Contractors

Contractors are expected to adhere to the security procedures and staff managing contracts/ contractors are responsible for ensuring security is maintained

In accordance with Health and Safety guidelines all building and maintenance contractors, including IT, must report to the Estates Department, who issue a permit to work and visitor identification badges which must be displayed at all times when on the premises

The Estates Department will inform the security, line managers etc. of contractors planned to be working out of hours, providing details of work to be conducted, duration and the number of contractors

Any contractors found working on the premises that have not been issued with prior notification will not be allowed to continue and may be asked to leave the premises. Access to restricted areas must be arranged in advance and contractors escorted whilst in restricted area. The Trust does not undertake to provide secure areas for contractors’ tools and equipment and as such contractors are responsible for the security of their tools and equipment whilst on Trust property. 4.25 Managing Incident Needing Police Assistance The Trust will support any management decisions to call the police to assist with the management of a security related incident, where the perpetrator may still be on the premises or security advice and support would be welcome. In these circumstances, once on site, the police will direct the management of the incident. The staff member in charge at the scene should give the police a concise and thorough briefing upon their arrival. The On-Call-Directors and LSMS should be notified as a matter of urgency to support the appropriate management of the incident.

4.26 Suspicious Packages - Guidance for staff

When dealing with suspicious items apply the 4 C’s protocol:- All staff should remain vigilant and be on the lookout for unusual or suspicious behaviour. If unexpected or unknown visitors are observed in restricted areas of a premises, or a package or object is found unattended in an unlikely spot, then there should be an immediate response. If there is a suspicion, however slight, that there is potential danger to staff and visitors on site, the senior manager should be contacted and a prompt response to the situation initiated. If there is a risk to safety, the local evacuation plan should be activated and an immediate evacuation should commence. The 4 C’s protocol is summarised as:

Confirm – as far as practicable the existence of a ‘suspicious device’.

Clear (the area) - evacuating away from the device.

Communicate – to managers and persons affected in the vicinity/building. Inform Police.

Control - set a cordon, do not allow anyone near the device or building (100 metres minimum).

Security Management Policy

Version 1.1 December 2016

12

CONFIRM whether the item exhibits recognisably suspicious characteristics

The HOT protocol may assist your judgement:-

HIDDEN?

Has the item been deliberately concealed, or is it obviously hidden from view? OBVIOUSLY suspicious?

Does it have wires, circuit boards, batteries, tape, liquids or putty-like substances visible? Do you think the item poses an immediate threat to life?

TYPICAL?

Is the item typical of what you would expect to find in this location? Most lost property is misplaced in locations where people congregate. Ask if anyone has left the item. If the item is believed to be unattended rather than suspicious, examine further before applying lost property procedures. However, if ‘H-O-T’ leads you to believe the item is suspicious, continue to apply the 4 C’s.

CLEAR the immediate area

Do not touch the item. Mark its position if practicable with a distinctive item, such as placing a ‘red coat’ next to it (as long as this does not delay the immediate evacuation away from the device).

Take charge and evacuate to a safe distance. Even for a small item such as a briefcase, move at least 100m away from the item starting from the centre and moving out.

If in a building, upon exiting attempt to wedge or prop doors open where possible, to provide a unhindered route to the package.

Keep yourself and other people out of line of sight of the item. It is a broad rule, but generally, if you cannot see the item then you are better protected from it.

Think about what you can hide behind. Pick something substantial and keep away from glass such as windows and skylights.

Cordon off the area.

COMMUNICATE - call 999

Inform your supervisor and Police.

Do not use radios or hand held mobile telephones within 15 metres of the device.

CONTROL - access to the cordoned area

Members of the public should not be able to approach the area until it is deemed safe.

Keep eyewitnesses nearby so that they can liaise with police upon their arrival and state what they saw at the earliest opportunity.

The evidence at the scene will need to be preserved to support follow up investigations.

Security Management Policy

Version 1.1 December 2016

13

5.0 How the Trust Risk Assesses the Physical Security of Premises and Assets It is a requirement that managers complete the Workplace Security Assessment at Appendix 1 regarding the security measures of their working areas. This assessment will be completed every 12 months and returned to the Local Security Management Specialist (LSMS).

Copies of the completed risk assessment will be sent to relevant service managers for the required action to be taken. It is the responsibility of the service manager to coordinate the completion of the actions

The LSMS will enter the inspection findings onto a database in order to monitor that risk assessments are taking place and to inform the required organisational overview

Control measures identified by the risk assessment will be implemented by the departmental manager to reduce risk

If risks are not, or cannot be managed at a local level, they will be escalated by the manager to their Divisional Quality Group meetings and if required submitted on to the Divisional and/or the Corporate risk register

Risk assessments will be reviewed annually or sooner where circumstances dictate e.g. security incidents, change of building function etc.

In addition the LSMS will complete a Crime Reduction Survey (Appendix 2) relating to the physical security measures of each Trust site and department/ward. This survey will be completed every 2 years. 5.1 Arrangements for the Organisational Overview of Risk Assessments of the Physical Security of Premises and Assets The LSMS will maintain and monitor a database of security risk assessments provided by managers regarding the physical security of premises and assets and will:

Provide a bi-monthly report on the completion of risk assessments to the Health, Safety & Committee in order than an organisational overview is maintained

5.2 Security Risk Assessment of Multi-Occupancy Buildings In multi-occupancy buildings, the managers of the various services within the building must liaise and agree a process for the completion of the Security Risk Assessment and management of security in general. The LSMS will provide assistance to the manager if areas have complex security needs and will work with the manager to complete a more detailed risk assessment. All issues identified in the risk assessment which require control measures are to be included in an action plan. 5.3 Action Plans

5.3.1 How Action Plans are Developed as a Result of Risk Assessments If the action required is urgent, then the issue is to be discussed with the manager and the required action implemented via the appropriate service, for example Estates Department.

Security Management Policy

Version 1.1 December 2016

14

For advice and assistance contact the LSMS/and or the Health and Safety Team. The action plan is to be agreed by the LSMS and the Manager. The action plan is to contain the following information:

Who has overall responsibility for the action plan (if not the Manager)

What the risk is

What is required to mitigate the risk

Who is responsible for the required action

When the action is to be completed

The manager is to forward a copy of the risk assessment and action plan to the LSMS. 5.3.2 How Action Plans are Followed up The completion of an action plan is the responsibility of the Manager of the area it applies to. The LSMS (and/or Safety Team) will provide assistance to the manager if required. The LSMS will request an update on the action plan near the completion date, and an exception report will be presented initially to the Health and Safety Committee escalated to the Quality and Safety Steering Group and Divisional Quality Group meetings if required. 5.3.3 How Action Plans will be Monitored

Divisional Quality Groups will monitor the progress of each action plan until it has been fully implemented

They provide progress and exception reports to the Quality and Safety Committee who will sign off all action plans

The relevant manager should review each risk assessment action plan as necessary but at least annually. Irrespective of this, re-audits will be scheduled into the annual programme of security related audits and inspections by LSMS and undertaken to confirm improvements have been embedded into current practice

5.6 Buildings not Under the Direct Control of the Trust If the building does not meet the requirements of this policy, the relevant Manager will discuss the matter with the building owners / managers and come to an agreement on how to ensure the building security is adequate to protect Trust staff and property. If an agreement is not possible, the matter is to be reported to the LSMS. Trust staff are to assist the building owners/manager and other occupants to maintain the security of a building at all times. 6.0 Procedures connected to this Policy There are no standard operating procedures currently connected to this policy.

Security Management Policy

Version 1.1 December 2016

15

7.0 Links to Relevant National Standards Compliance with Statutory Direction and Guidance The Trust has a statutory obligation to comply with direction issued through the NHS Standard Contract and guidance issued through NHS Protect. The following information highlight such areas of responsibility.

Standard Criteria

4.1 The NHS Standard Contract

In April 2013 Secretary of State Directions for the provision of security management services for Provider Trusts were formally replaced with revised directions issued through the NHS Standard Contract which directs that the Trust is contractually obliged to implement and maintain the following security management arrangements

Service Condition 24.1 The Provider must put in place and maintain appropriate arrangements to address security management and counter fraud issues.

Service Condition 24.2 Within 1 month following the service commencement date, the Provider must complete an Organisation Crime Profile (OCP), using the appropriate toolkit provided by NHS Protect and in accordance with NHS Protect guidance.

Service Condition 24.3 Following completion of the OCP in accordance with SC 24.2 the Provider must take the necessary action to meet the Standards set by NHS Protect at the level indicated by the OCP

Service Condition 24.4 If requested by the Co-ordinating Commissioner or NHS Protect, the Provider must allow a person duly authorised to act on behalf of NHS Protect or on behalf of any Commissioner to review, in line with the appropriate standards, security management and counter-fraud arrangements put in place by the Provider.

Service Condition 24.5 The Provider must implement any reasonable modifications to its security management and counter-fraud arrangements required by a person referred to in SC 24.4 in order to meet the appropriate standards within whatever time periods as that person may reasonably require.

Service Condition 24.6 The Provider must, on becoming aware of: 24.6.2 - Any suspected or actual security incident or security breach involving staff who deliver NHS funded services or involving NHS resources, report the matter to the Local Security Management Specialist of the relevant NHS Body and to NHS Protect

Security Management Policy

Version 1.1 December 2016

16

Standard Criteria

SC 24.7 On the request of the DoH, NHS England, NHS Protect or the Co-ordinating Commissioner, the Provider must allow NHS Protect or any Local Security Management Specialist appointed by a Commissioner, as soon as is reasonably practicable and in any event not later than 5 operational days following the date of the request, access to:

24.7.1 All property, premises, information (including records and data) owned or controlled by the Provider relevant to the detection and investigation of cases of bribery, fraud or corruption and/or security incidents or security breaches directly or indirectly connected to this Contract; and

24.7.2 All staff who may have information to provide, that is relevant to the detection and investigation of cases of bribery, fraud or corruption, or security incidents and/or security breaches directly or indirectly in connection with this Contract.

NHS Protect guidance issued through Security Management Standards for Providers Part of revised direction issued through NHS Protect also requires all Provider Trusts to implement and comply with a range of security management standards set out in 4 sections covering corporate responsibilities and three other key principles for action, as follows:

1. Strategic governance - sets out the requirements in relation to the strategic

governance arrangements of the organisation to ensure that anti-crime measures are embedded at all levels across the organisation.

2. Inform and Involve - sets out the requirements in relation to raising awareness of crime risks against the NHS, and working with NHS staff and the public to publicise the risks and effects of crime against the NHS.

3. Prevent and Deter - sets out the requirements in relation to discouraging individuals who may be tempted to commit crime against the NHS and ensuring that opportunities for crime to occur are minimised.

4. Hold to Account -sets out the requirements in relation to detecting and investigating crime, prosecuting those who have committed crimes, and seeking redress.

A self-assessment against these standards is undertaken by the LSMS on an annual basis and the outcome of this assessment is submitted to NHS Protect.

NHS Protect may also undertake a full or focussed assessment of compliance with the standards.

Security Management Policy

Version 1.1 December 2016

17

7.1 Links to Relevant National Standards CQC Regulation 15: Premises and Equipment The intention of this regulation is to make sure that the premises where care and treatment are delivered are clean, suitable for the intended purpose, maintained and where required, appropriately located, and that the equipment that is used to deliver care and treatment is clean, suitable for the intended purpose, maintained, stored securely and used properly. Providers retain legal responsibility under these regulations when they delegate responsibility through contracts or legal agreements to a third party, independent suppliers, professionals, supply chains or contractors. They must therefore make sure that they meet the regulation, as responsibility for any shortfall rests with the provider. Where the person using the service owns the equipment needed to deliver their care and treatment, or the provider does not provide it, the provider should make every effort to make sure that it is clean, safe and suitable for use.

7.2 Links to other Key Policies Lone Working Policy This policy aims to provide guidance for managers and individuals, support the development of safe systems of working where the health, safety and well-being of lone workers can be carefully considered within a variety of settings. CCTV Surveillance Policy The purpose of the policy is to provide sufficient guidance so that an assessment can be undertaken to determine whether CCTV is justified and how it should be operated in practice. Risk Management Policy The purpose of the Risk Management Policy is to provide an effective framework through which the Trust can safely and effectively manage risks. Violence and Aggression Policy The purpose of this policy is to detail the Trust’s strategy and legislative compliance in tackling violence and aggression against patients and staff. 7.3 References NHS Business Services Authority - Security Management Service Division

(2004) Security Management Strategy - A professional approach in managing security

in the NHS (2003) NHS Protect website provides further information on managing security:

http://www.nhsbsa.nhs.uk/Protect.aspx NHS Security Management Manual (2008) (Restricted access to Local Security

Management Specialists) Local Security Management Specialist Security Manual: 7th Ed, Wilson J, and

Brooksbank D, 1999, Gower Publishing, Aldershot

Security Management Policy

Version 1.1 December 2016

18

8.0 Roles and Responsibilities for this Policy

Title Role Key Responsibilities

All Employees Adherence - Ensure they are aware of the Security Management Policy and adhere to it - Co-operate with management to achieve the aims, objectives and principles of the Security Management Policy

- Co-operate in observing security measures and combating crime at all levels - Report any suspected breach in security immediately to their manager

- Report all security incidents via the Trust’s Incident Reporting System

- Ensure they are aware of their responsibilities in protecting at all times the assets and property of patients, visitors, colleagues and other Trust users, as well as the safety of the Trust’s assets and property

- Abide by all specific security procedures that exist at all times - Ensure they seek authority from their line manager when removing property belonging to the Trust. Failure to do so could

result in disciplinary action or criminal prosecution as it is an offence to remove property belonging to the Trust without written authority

Local Counter Fraud

Specialist (LCFS)

Specialist Advice

and Investigation - Determine the need for a police investigation where there has been a financial security breach or fraud - Undertake separate investigation to identify the weaknesses in physical security procedures at the Trust

Service Managers Operational - Ensure statutory Health and Safety requirements are complied with

- Monitor and review performance in connection with this policy

- Ensure departmental security issues are reported to and from the Group Managers - Record any significant hazards and implement appropriate control measures identified which are both reasonable and

practical to either remove or reduce the hazards to an acceptable level. This procedure to be undertaken as part of the monthly health and safety checklist

- Ensure risk assessments are undertaken annually (see Appendix 1) and actions implemented to ensure that staff continue

to work within a safe environment and the security of the building is maintained (support requested via the LSMS) - Ensure unmanageable/significant risks are escalated via the risk register process

- Ensure the incident reporting process is followed - Ensure post incident care and support is afforded to those affected by violence and aggression incidents or affected by a

criminal act

- Ensure appropriate systems for alerting staff and others following an incident of identified risk are in place - Ensure incidents of theft, criminal damage, break-ins, inappropriate access into buildings are investigated and key staff

involved, such as the Local Security Management Specialist - Ensure local workplace induction is attended by all new staff members

Security Management Policy

Version 1.1 December 2016

19

Title Role Key Responsibilities

Group Directors, Group Managers and Heads of

Service

Implementation - Ensure security and the safety of patients, visitors and staff are reflected in all appropriate group procedures and guidance; which require regular monitoring, review and updating as necessary

- Engage with the LSMS to identify, categorise and resolve security risks within their areas - Ensure action plans are developed by managers and progressed for mitigating identified security risks

- Demonstrate and promote a pro-security culture across their area of responsibility

- Ensure that appropriate action is taken in respect of persons who are suspected of committing a criminal offence, misconduct or other breaches of security in contravention of the policies of the Trust

- Ensure that all security incidents are reported in accordance with the Trust Incident Reporting Policies and that staff are fully supported following any incident

- Ensure that regular liaison/communication between the Trust and Police is maintained at appropriate levels, involving the

LSMS where support is required - Ensure procurement and ongoing management of security related contracts such as security guarding or CCTV are

managed in accordance with relevant policies and guidance and that they engage with the Estates Department before authorising the purchase of security systems and equipment

Local Security Management Specialist

(LSMS)

Implementation Lead

- Provide the professional skills and expertise to tackle security management issues within the Trust - Exercise specific responsibilities on behalf of the Security Management Director of any impact resulting from new legislation

or national directions/guidance - Offer site security and crime prevention advice, support and assistance in upholding and developing operational

arrangements that affect security

- Work closely with the Local Counter Fraud Specialist where an internal investigation has highlighted internal/procedural security weakness

- Review all security incidents and where necessary include a location visit in the program of site security survey visits - Liaise with external agencies regarding non-clinical security matters e.g. Police, Crown Prosecution Service, and NHS

Protect Legal Protection Unit - Liaise with the local police in the event of a security related incident to assist with any investigation

- Assist managers to carry out risk assessments to highlight any security related weaknesses

- Undertake a programme of security survey visits, to examine all aspects of building and procedural security (in line with template Security and Crime Reduction Risk Assessment Appendix 2)

- share the findings of any security risks that have been identified with the managers of the service and discuss recommendations for each action

- Develop action plans as a result of the recommendations/ findings from any risk assessments

- Monitor the progress of the improvements in security as outlined in the action plans developed

Health and Safety

Committee

Responsible - Monitor the effectiveness and overall compliance in meeting statutory obligations and practicalities of providing a safe and

secure environment that protects patients, staff, visitors, their property and the physical assets of the organisation so far as is reasonably practical. Membership includes senior representatives from the three operational groups of mental health,

learning disabilities and children and young people’s services

Security Management Policy

Version 1.1 December 2016

20

Title Role Key Responsibilities

Quality and Safety Committee

Monitor - Ensure that security management is managed efficiently and effectively in accordance with the Board’s Assurance Framework and strategic priorities. The Committee has delegated responsibility for ensuring that security management is

managed efficiently and effectively to the Health and Safety Committee - Receive progress and exception reports from the Health and Safety Committee

Group Management

Boards

Scrutiny and

Performance

- Receive audits, reports and recommendations from the Health and Safety Committee on all security related matters

relevant to their group - Monitor performance and implements strategies to provide a safe and secure environment that protects patients, staff and

visitors and their property as well as the physical assets within their group

- Provide progress and exception reports to the Quality and Safety Committee

Trust Board Strategic - Have a strategic overview and final responsibility for a safe environment in which the uninterrupted delivery of quality

health care can be delivered

Executive Director of

Nursing, AHPs and Governance

Executive Lead - Designated Security Management Director in accordance with the requirement for all NHS Trusts to appoint a Board

Executive Director to take responsibility for this role - Ensure compliance with the Secretary of State Directions on tackling violence against staff and professionals who work in,

or who provide services to, the NHS in accordance with the provisions of the NHS Standard Contract 2012/13 - Lead on all aspects of security management

Chief Executive Accountable - Ensure that this policy is implemented within the Trust (operational responsibility has been delegated to Executive Director

of Nursing, AHPs and Governance)

Security Management Policy

Version 1.1 December 2016

21

9.0 Training

What aspect(s) of this policy will

require staff training?

Which staff groups require this

training?

Is this training covered in the Trust’s Mandatory and Risk

Management Training Needs Analysis document?

If no, how will the training be delivered?

Who will deliver the training?

How often will staff require

training

Who will ensure and monitor that staff have

this training?

Security Management

In-patient staff No, staff will receive specific training in relation to this

policy where it is identified in their individual training needs

analysis as part of their

development for their particular role and

responsibilities

Internally Local Security Management

Specialist

This will be determined on

an individual basis

Health and Safety Committee

10.0 Equality Impact Assessment Black Country Partnership NHS Foundation Trust is committed to ensuring that the way we provide services and the way we recruit and treat staff reflects individual needs, promotes equality and does not discriminate unfairly against any particular individual or group. The Equality Impact Assessment for this policy has been completed and is readily available on the Intranet. If you require this in a different format e.g. larger print, Braille, different languages or audio tape, please contact the Equality & Diversity Team on Ext. 8067 or email [email protected] 11.0 Data Protection and Freedom of Information

This statement reflects legal requirements incorporated within the Data Protection Act and Freedom of Information Act that apply to staff who work within the public sector. All staff have a responsibility to ensure that they do not disclose information about the Trust’s activities in respect of service users in its care to unauthorised individuals. This responsibility applies whether you are currently employed or after your employment ends and in certain aspects of your personal life e.g. use of social networking sites etc. The Trust seeks to ensure a high level of transparency in all its business activities but reserves the right not to disclose information where relevant legislation applies.

Security Management Policy

Version 1.1 December 2016

22

12.0 Monitoring this Policy is Working in Practice

What key elements will be monitored?

(measurable policy objectives)

Where described in

policy?

How will they be monitored?

(method + sample size)

Who will undertake this

monitoring?

How Frequently?

Group/Committee that will receive and

review results

Group/Committee to ensure actions

are completed

Evidence this has

happened

Completion of the annual security risk assessment and

completion of LSMS crime reduction survey

5.0 Summary report detailing security issues

investigated and recommended actions

Local Security Management

Specialist

Annually Health and Safety Committee

Quality and Safety Steering Group

Minutes of meetings/

action plans signed off

How the organisation risk assesses the physical

security of premises and assets

Appendix 1 Security Audit and inspection – security risks

to be reflected in group/ Trust risk register as

appropriate

Local Security Management

Specialist

Annually Group Quality and Safety Steering

Groups

Group Quality and Safety Steering

Groups

Minutes of meetings/

action plans signed off

How action plans are developed as a result of risk

assessments

4.2/ 4.2.1/ 4.2.2 Audits, reports and recommendations of all

security risk assessments

Local Security Management

Specialist

Monthly Health and Safety Committee

Group Management Boards

Minutes of meetings/

action plans

signed off

Security Management Policy

Version 1.1 December 2016

23

Appendix 1: Building /Ward Security Risk Assessment

Area/Department:

Site: Date: Review date:

Risk Assessor(s):

Role/designation:

Introduction: It is the policy of the Trust that formal regular periodic premises security inspections / security risk assessments are carried out by Managers to comply with the Minimum Standards under the Workplace Health and Safety at Work (WHSW) Regulations for all areas where Trust staff are based. All managers will complete the security risk assessment for their building / area and if required create an action plan of work to address deficiencies. The manager is responsible for the completion of the tasks within the action plan.

Question Yes No Further Action Question Yes No Further Action

Internal Procedures

1. Explanation of what your service is and what it does

8. Does the building have a local security process in place and are all staff locally inducted and records of training kept?

2. Explanation of how the building / office is secured at night

9. Do all staff have and wear ID Badges with appropriate levels of access controls?

3. Explanation of how the premises is open each morning

10. Is a record kept of all people who sign out keys /fobs or temporary ID Cards?

4. Is CCTV fitted and who controls request /release of recordings?

11. Are all staff aware of what the lockdown and emergency planning procedures are?

5. Does the building or ward have a booking in and out Process?

12. Are all staff trained in fire evacuation procedures and do you have appointed Fire Wardens?

6. Do staff feel safe and secure whilst going to and from car park to work place?

13. Have all staff been made aware of the Lone working process and lone working policy and records kept?

7. Are premises externally & internally well lit?

14. Do all staff have somewhere lockable to secure their personal possessions?

Security Management Policy

Version 1.1 December 2016

24

Question Yes No Further Action Question Yes No Further Action

Internal Procedures and Processes

15. Are procedures in place to stop security access cards/fobs being taken off wards and forensic sites?

22. Are all staff made aware not to allow anyone access to restricted areas who do not have identification and not readily recognised?

16. Where the building has a key cabinet is the cabinet locked and staff made aware of key location?

23. Where buildings are fitted with access buzzers / videx / phones are staff who give access suitably trained and records kept

17. Can patients in communal areas be easily observed by staff without being obtrusive and maintaining some privacy?

24. Are all Patient / Staff identifiable documents kept in locked cabinets or rooms?

18. Are external agencies that use the building / meeting rooms given security brief on how to leave room / building at end of business?

25. Have you completed a lone working risk assessment for your staff and have you shared the assessment with them?

19. Have carried out an environmental safety inspection of this work area within the last 12 months

26. Is there clear view of all areas of the corridors and public areas to prevent ‘blind’ areas where attackers may hide?

20. Have all issues identified in the environmental inspection been addressed. If no what actions are still outstanding?

27. Are documents containing personal information (medical records, staff data etc.) secured away from service users and visitors?

21. Do reception staff have a system of summoning assistance to manage a violent incident and is this system tested?

28. Is there adequate visibility allowing persons accessing building/ward to be seen?

Security Management Policy

Version 1.1 December 2016

25

Question Yes No Further Action Question Yes No Further Action

Management of Violence and Aggression

29. Has a violence and aggression risk being completed for your service area?

39. Explain what system are in place for staff to summon assistance to manage a violent incident

30. Explanation of the clinical profile and risk factors of patients cared for within your service / ward

40. Are staff provided with and trained in use of personal attack alarms?

31. Explain how this type of patient is suitable to be cared for on this ward?

41. Have details of this training been recorded and available on request

32. Explain how staff are qualified to work on your ward?

42. Explain how staff are made aware of risk assessments and care plans

33. Explain how staff are provided with information about patients who can become violent /aggressive?

43. Explain how contents of risk assessment and care plans shared with staff working on wards?

34. Explain how staff supervised on wards?

44. Do you conduct handover procedures at the end/start of each shift and are these recorded?

35. Explain how patients with history of aggression are managed/ cared for/supervised?

45. Explain in relation to violence and aggression what safety issues are discussed at handover?

36. Explain what happens to a patients care plan following an assault to staff or other patients?

46. Explain how staff made aware of the levels of observation required for patients in their care?

37. Explanation of the debrief or discussion following incidents of attacks on staff so others might avoid a future occurrence

47. Explain how clinical staff are involved in developing a patient risk assessments?

38. Explain how staffing levels are maintained on the ward and are there any issues?

48. Explain how are staff kept fully briefed on patients clinical risk factors?

Security Management Policy

Version 1.1 December 2016

26

Question Yes No Further Action Question Yes No Further Action

Management of Violence and Aggression

49. Are the decorations (wall paper, paint colour, pictures, plants, ornaments etc.) conducive to a relaxing environment?

53. Have all staff completed MAPA training

50. Are there regular activities provided for service users to relieve boredom?

54. Is the noise kept to a level conducive with relaxation and comfort (consider intermittent noise such as squeaky doors, rattling trolleys, staff talking etc.)

51. Are all dangerous implements (kitchen utensils, scissors, sharp objects etc.) secured away from service users and visitors?

55. Explanation and numbers of any security breaches within your department during the past 12 months

52.Do Estates staff have swipe card access on to your ward? (if yes immediately contact Helpdesk and have this level of access deactivated)

56. Do contractors have swipe card access on to your ward? (if yes immediately contact the helpdesk and have this level of access deactivated)

Note: 1. Only clinical staff working on wards are authorised to have direct access on to wards by use of access control swipe cards. 2. Non-clinical staff and contractors who want to enter a ward for the purpose of carrying out inspections etc will only gain access by pressing the buzzer and booking onto the ward. 3. At all times non-clinical staff entering a ward will be accompanied by ward staff for their own safety.

Security Management Policy

Version 1.1 December 2016

27

Action Plan

N0 Identified Issues How staff / patient affected Remedial Action Responsible person

Required action date

Date completed

1

2

3

4

5

Review Dates: (Annually or within one month of any security breach /changes to security procedures or introduction of new legislation)

Review/Assessment date: Name: Reason for review

Review/Assessment date: Name: Reason for review

Review/Assessment date: Name: Reason for review

Security Management Policy

Version 1.1 December 2016

28

Appendix 2: Security and Crime Reduction Risk Assessment

N.B. Completion by the LSMS only

Location Details:

Directorate

Department Manager

Location

Type of facility:

Date and type of last Assessment

Assessment conducted by

Date of assessment

Serial

(a)

Heading/Sub Heading

(b)

Requirement

(c)

Comment/Observation

(d)

Inspection Recommendation (e)

A

1

List recommendations from the previous assessment that have not been completed.

2 Details of incidents since last inspection No & Type SI’s No & Type other incidents

3 List any recommendations from SI reviews that have not been completed

Security Management Policy

Version 1.1 December 2016

29

N0 (a)

Criteria (b)

Requirement (c)

Comment/Observation (d)

Inspection Recommendation (e)

4 External environment: Fencing Gates

Is environment well maintained? Details of the perimeter fence in place? Is it appropriate to the location of the site and the assets it protects? Are the gates on the perimeter constructed to the same standard as the fence?

5 Doors and Locks Do external doors meet required standard

6 Lighting Is lighting effective? Are there any areas that require additional lighting?

7 Glazing Is glazing to an appropriate standard or protected by Anti Shatter Film (ASF)?

8 Car parking Car parking available? Does Car park meet Park Mark standard? Is access to Car park controlled? Issues related to damage/theft of/from vehicles.

9 Reception Is access to reception controlled? Is desk suitable? Are screens in place? Is Furniture appropriate Is access from reception controlled? Are toilets available in reception area Is there interview room accessible from reception without need to enter remainder of facility?

10 CCTV: Is CCTV installed or planned? Is the Operational Requirement (OR) available? When the OR was last reviewed? Does the system meet the OR?

Security Management Policy

Version 1.1 December 2016

30

Serial

(a)

Heading/Sub Heading

(b)

Requirement

(c)

Comment/Observation

(d)

Inspection Recommendation (e)

11 Intruder Detection Systems

Is IDS installed? Is the Operational Requirement available? The OR was last reviewed? Does the system meet the OR? Is system monitored? Police Response?

12 Staff Alarms Type? Is the Operational Requirement available? When the OR was last reviewed? Does the system meet the OR? Is system monitored? Details of Response

13 Automated Access Controls (AACS)

Is AACS in place or planned? Is the Operational Requirement available? When the OR was last reviewed? Does the system meet the OR? DPA Compatible? Business Continuity Issues addressed?

14 Access Control Are Mechanical Key Code Locks in use? Process for changing code Approx. date of last change Are other Access Control measures in place? Describe them.

15 Key Control

Instructions Key Registers Issue Return Out of hours Key Holding arrangements Start Work/cease work arrangements

Security Management Policy

Version 1.1 December 2016

31

Serial

(a)

Heading/Sub Heading

(b)

Requirement

(c)

Comment/Observation

(d)

Inspection Recommendation (e)

16 Visitors/book/process Is a Visitors’ Book maintained at the point of entry?

17 Escorting requirements

Are all visitors who do not hold acceptable credentials escorted to and from the person with whom their business is to be conducted? Are visitors given temporary identification badges?

18 Security Guarding/patrolling

Security Guarding activity? Assurance re Licensing? Guards present? If so what hours? Location of patrol logging points Contact details of security patrol held? Regular reports received? Issues with security guards?

19 Personal Property/Lockers

Are adequate arrangements in place for security of staff personal property?

20 Are adequate arrangements in place for security of patients’ personal property?

21 Staff only areas Is access to staff only areas adequately controlled?

22 Contraband Are processes in place for securing contraband items until discharge/ disposal of items if appropriate

23 Waste Disposal If confidential waste disposal contracts are in place is activity monitored? How is the disposal of magnetic and other media organised?

Security Management Policy

Version 1.1 December 2016

32

Serial

(a)

Heading/Sub Heading

(b)

Requirement

(c)

Comment/Observation

(d)

Inspection Recommendation (e)

24 Reception/Post Room Measures

Are staff aware of issues related to the receipt of suspicious packages? Adequate procedures for security of inbound/outbound post.

25 Reception/Post Room Measures

Are staff aware of issues related to the receipt of suspicious packages? Adequate procedures for security of inbound/outbound post.

26 Security of CD’s and other medications

Are adequate procedures in place for securing CD’s? Are adequate procedures in place for securing other medication? Are adequate procedures in place for accounting for / securing prescription pads?

27 Security Training Approx. number of staff who have attended CRT/PSTS/MAPA Training

28 Security Awareness Assess level of security awareness among staff.

29 Asset Register Is there an Asset Register? Does it contain the sufficient detail

30 Asset Protection Are sufficient steps taken to protect assets?

31 Loss/compromise Are business continuity aspects of loss/compromise considered?

32 Security Awareness Assess level of security awareness among staff

33 Lone Working Guidance

Are staff aware of Lone worker guidance

34 Are adequate controls in place to monitor location / welfare of staff working in community

35 How are staff working in community supported in event of a problem?

36 Do staff have access to remotely monitored alarm systems?

Security Management Policy

Version 1.1 December 2016

33

Serial

(a)

Heading/Sub Heading

(b)

Requirement

(c)

Comment/Observation

(d)

Inspection Recommendation (e)

37 Are interview Rooms furnished/equipped appropriately

Alarms fitted/accessible? Furniture and fittings kept to minimum? Anti-barricade doors fitted? Vision panels in doors

38 Is there adequate liaison with:

Community Safety Bureau/ Community/Neighbourhood Officers Local command team

39 Are there local arrangements in place for

Information sharing? Requesting assistance on planned basis?

Action Plan

N0 Identified Issues How staff / patient affected Remedial Action Responsible person

Required action date

Date completed

1

2

3

4

Review Dates: (Annually or within one month of any security breach /changes to security procedures or introduction of new legislation)

Review/Assessment date: Name: Reason for review

Review/Assessment date: Name: Reason for review

Review/Assessment date: Name: Reason for review

LSMS Name:_____________________________________________________________________ LSMS signature: _________________________________________________________________ Date completed:__________________________________________________________________

Security Management Policy

Version 1.1 December 2016

34

Appendix 3: Contacts for Security Incident and Advice

Internal:

Head of Health and Safety - 0121 612 8015 / 8168 Local Security Management Specialist – 0121 612 8015/ 8168 External: POLICE:

For all Emergencies : Sandwell Sarah Smyth – Sandwell Partnership Sergeant – 101 #811 3051/2 [email protected] Steve Thompson – Sandwell Partnership Officer – 101 #811 3051/2 [email protected] – forensic history requests Lillie Abbott – Sandwell Anti-Crime Co-ordinator – 101 #811 3051/2 [email protected] Wolverhampton Corrina Griffiths – Wolverhampton Partnership Inspector – 101 #871 3299 [email protected] Keely Gibbs – Wolverhampton Partnership Officer – 101 #871 3278 [email protected] Kelly Hale – Wolverhampton Partnership Officer – 101 #871 3302 [email protected] – forensic history requests Counter Terrorism Unit Richard Holder – Prevent Officer – 07789 895718 [email protected] Lisa Bird – Prevent Sergeant – 07825 112401 [email protected] Triage Car Lee Davies – Triage Car Sergeant - 07876 216650 / 101 #871 3029 [email protected]

Security Management Policy

Version 1.1 December 2016

35

Policy Details

* For more information on the consultation process, implementation plan, equality impact assessment, or archiving arrangements, please contact Corporate Governance

Review and Amendment History

Version Date Details of Change

1.1 Dec 2016 Policy amended to reflect changes in systems and procedures and new policy format; Amendments to ‘suspicious Items’ 4.26, in line with police protocols

1.0 Dec 2012 New policy for BCPFT; alignment of policies following TCS

Title of Policy Security Management Policy

Unique Identifier for this policy BCPFT-SEC-POL-03

State if policy is New or Revised Revised

Previous Policy Title where applicable n/a

Policy Category Clinical, HR, H&S, Infection Control etc.

Security

Executive Director whose portfolio this policy comes under

Executive Director of Nursing, AHPs and Governance

Policy Lead/Author Job titles only

Local Security Management Specialist

Committee/Group responsible for the approval of this policy

Health and Safety Committee

Month/year consultation process completed *

November 2016

Month/year policy approved December 2016

Month/year policy ratified and issued December 2016

Next review date December 2019

Implementation Plan completed * Yes

Equality Impact Assessment completed * Yes

Previous version(s) archived * Yes

Disclosure status ‘B’ can be disclosed to patients and the public