HID logo

Hospital and Healthcare Security is Critical at the Door, for Protechealtting Patient Data, and in the Cloud

Hospitals face many security threats in an environment complicated by high traffic volumes, complex staffing requirements, and a demanding regulatory environment.  In California, hospitals must report any security breach event, after which the California Department of Public Health (CDPH) checks policies, practices and audit trails, and executes inspections and assesses fines.  Often, hospital administrators must also follow federal guidelines established by the Centers for Medicare & Medicaid Services (CMS) that, at times, conflict with state rules and result in fines.  Other entities that set security guidelines include the Joint Commission accreditation and certification body, which has oversight for physical building security, water, safety, fire, and other security processes, and the Det Norske Veritas (DNV), an independent foundation that works with healthcare authorities and providers to manage risk and improve healthcare delivery.  Legislation such as the Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996, which established U.S. standards for privacy and security, also impact hospital access control policies and procedures. 

Meeting modern security challenges while complying with these and other regulatory mandates requires best practices for both physical and IT security, using flexible and scalable access control systems that can combat today’s evolving security threats while supporting future improvements in security and convenience.  It is also important for healthcare institutions to maximize the ongoing value of their investment by ensuring that ID cards used for opening doors can also be used for other applications including time-and-attendance, cashless payment and logical access control to protect IT assets and enhance patient information privacy protection. 

Improving Physical Access Control

Hospital security challenges can be extremely complicated.  Patients and visitors must feel welcomed and comfortable, yet safe and well protected.  Hospitals also must support affiliated doctors who need to carry multiple badges for all the locations they visit.  Over time, administrators may want to integrate access control with visitor management, or add video surveillance and other technologies.  This can be difficult to accomplish with legacy systems, which are vulnerable to security threats and can’t easily be upgraded to new features and capabilities.  In contrast, the latest physical access control system (PACS) system architectures are based on dynamic technologies, making it significantly easier and less expensive to upgrade them.  Benefits of these systems include:

  • Improved security
  • Simplified system management
  • Improved risk management
  • A path to networked access control
  • Ability to add wireless locksets
  • More secure and simplified visitor management, integrated with the PACS
  • Opportunities to do more with the card
  • Convergence of PACS with secure logical access control

Today’s solutions enable healthcare organizations to achieve a versatile PACS that protects everything from hospital doors and storage areas to the cloud and desktops.  With proper planning, healthcare institutions will be able to preserve investments in today’s physical access control credential solution as they seamlessly add new capabilities in the future.  The result is a fully interoperable, multi-layered and highly adaptable security solution that spans the organization’s networks, systems and facilities, and has room to grow, evolve and improve over time.  


HID Origo™ 개발자 포털 소개

HID Origo™ 개발자 포털의 가용성에 대한 소식을 전해 드릴 수 있게 되어 기쁘게 생각합니다. 이 포털에서는 기술 파트너들에게 직원들의 물리적 및 디지털 경험과 기술이 혼재하는 앱과 API 통합을 구축하는 데 필요한 도구와 지원을 제공합니다.

10월은 국가 사이버 보안의 달입니다

매년 10월은 정부와 사이버 보안 업계가 협력을 도모하기 위해 지정한 국가 사이버 보안 인식의 달(NCSAM)입니다. 이 교육 기간 동안 유익한 정보를 통해 기업과 개인이 온라인에서 스스로를 보호할 수 있는 방법에 대한 인식을 고취시킬 수 있습니다.