Download Crime Prevention and Security Management in Healthcare Facilities and more Exams Nursing in PDF only on Docsity! IAHSS ADVANCED LEVEL CERTIFICATION EXAM (ACTUAL EXAM QUESTIONS) AND STUDY GUIDE 2024 QUESTIONS AND 100% CORRECT ANSWERS| (BEST STUDY MATERIAL FOR IAHSS ADVANCED CERTIFICATION) What is the primary role of a security officer in crime prevention? Correct Answer Reduce the opportunity for a person to commit a crime Crime prevention is the anticipation, recognition, and appraisal of a crime risk. It also involves what? Correct Answer Initiating some action to remove or reduce the risk What must be done about life safety deficiencies found in the hazard surveillance tour? Correct Answer Correct them immediately What is the purpose of crime analysis? Correct Answer Identify problems and develop strategies to reduce problems Which of the following is easier and more cost efficient for an institution? Correct Answer building in security systems during building design Healthcare facilities that provide _________ customer service motivate customers to tell others about these organizations Correct Answer excellant Process improvement in customer service can be measured how? Correct Answer Surveys, Monitoring performance, Bench marking, Service standards ________ can be an excellent way to measure customer service and improve performance. Correct Answer Feedback ________ is an element in improving customer service Correct Answer Identifying customers-Attitude-Communication-Training Communication is ___________ Correct Answer 93 percent body language, 7 percent words Which legal test takes into account neighborhood crime rates, industry standards, and the owner's experience at other locations? Correct Answer foreseeability The major source of premise liability in healthcare is from Correct Answer slips and falls Property owners have a ______ duty to maintain the property in a _____ condition. Correct Answer legal...reasonably safe Which of the following are elements necessary to establish negligence in a premise liability case? Correct Answer 1. duty to the plaintiff 2. Failure to meet the duty. 3. Breach of a duty caused an injury. Which of the following are examples of risks security officers should identify? Correct Answer Burned out lights-Breached fence lines-Slip and fall hazards Failure to conduct routine patrol can ultimately result in what? Correct Answer an increase in security spending Which of the following are part of the security officer's role in providing security services and protective measures at off- campus locations? Correct Answer Conduct the security risk assessments to determine what security protections are required at off-campus facilities Be alert to, identify, and report specific situations that encourage or make crime more likely at off-campus facilities Work place violence is defined as any behavior in a work environment that a reasonable person finds what? Correct Answer Intimidating Threatening Violant The federal Bureau of Investigation characterizes workplace violence into how many broad types? Correct Answer Five Which of the following is not an example of abusive behavior? Correct Answer Simple assault According to the Employment Law Alliance study conducted in 2007, how many workers have been victims of abuse at work? Correct Answer Nearly a half Fill in the blank: Violence is the --------------leading cause of death in the workplace.. Correct Answer Fourth A forensic patient's criminal record should be disclosed to whom? Correct Answer Kept confidential What organization provides training and education on preventing infant abduction? Correct Answer National Center of Missing and exploited children Who should talk to media about VIPs in your facility? Correct Answer Public relations or administration personnel Homeless individuals who take shelter in your facility may commit what crime? Correct Answer Assault Theft Homicide Individuals with Munchhausen syndrome may what? Correct Answer Have a predictable relapsed and unclear symptomsa What should be done about known gang members who require medical treatment in your facility? Correct Answer They should be admitted under an assumed name Infant abduction can be prevented by doing what? Correct Answer Educating staff and parents Who should take charge in dealing with combative patients? Correct Answer Experience medical staff members Which is the most commonly used identification system in security plans to prevent infant abductions? Correct Answer Four bracelet system Stalking can be defined as what? Correct Answer Unwanted e- mails Photographing Obsessive phone calls Your effectiveness in dealing with behavior problems depends on what? Correct Answer Your verbal communication skills There are how many routes of infection transmission? Correct Answer Three Who requires that security officers be able to demonstrate age- specific competence when iterating with children and the elderly? Correct Answer The Joint Commission The National Center for Missing and Exploited Children has published which of the following? Correct Answer A booklet to assist in developing an abduction prevention and response plan How can security and medical staff ease tension in an emergency department waiting room? Correct Answer Form a system of constant communication Which of the following is not an outward sign of gang activity? Correct Answer Group comprised of the same ethic origin A healthcare security or police officer should do what during a labor dispute? Correct Answer Remain objective A healthcare security department should do this with any photographic or video evidence from a civil disturbance. Correct Answer Turn it over to the organization's legal department Which of the following is a challenge encountered by healthcare security when dealing with a VIP? Correct Answer Increased access control Patient privacy News media What is the term to describe individuals who pose as licensed healthcare providers? Correct Answer Medical imposters The Joint Commission is a _______accrediting authority recognized by government agencies, insurance companies, and healthcare providers. Correct Answer State?????? Who must take responsibility for your advancement as a professional security officer? Correct Answer You Who may offer to reimburse you for expenses related to professional advancement? Correct Answer Your employer What is the role of the IAHSS in the area of healthcare security and safety ? Correct Answer To help healthcare security professionals improve the performance of healthcare security officers. The best way to achieve enhanced customer service is by using what method to exceed the expectations of the customer? Correct Answer multi-tiered approch In responding to an active shooter scenario the armed healthcare security officer should Correct Answer realize they can minimize casualties by taking successful action Which of the following is used to evaluate the potential adverse impact of the external environment on the facility as well as the impact on services provided for the patients, staff and others coming into the facility? Correct Answer proactive risk assesment While a security officer can perform professionally, a "profession" must have a(n) Correct Answer recognized body of knowlegde When is it OK to handle evidence at a crime scene? Correct Answer the evidence creates an undue risk or unsafe environment to others What is commonly used in integrated security systems to immediately assess active alarm conditions? Correct Answer CCTV Taking into account the type of neighborhood and local crime rates as well as incidents at and around the facility best describes Correct Answer prior similar crimes Canine patrol can decrease the Correct Answer risk to officer safety To the healthcare security officer the infectious patient Correct Answer is the most serious threat Security Departments are judged on what they do to: Correct Answer proactively prevent incidents During a walk out strike at a healthcare facility hospitals security can expect which of the following? Correct Answer picket lines formed on public sidewalks surrounding the facility A_________reader is an example of a "what you are" access control reader Correct Answer proxy card Risk management practices done by an organization include Correct Answer protecting it's assets and medical information Which of the following protocols is used relating to Gang Affiliates: Correct Answer staff education What is one of OSHA's five elements of workplace violence prevention program? Correct Answer a detailed work site analysis When completing documentation related to a critical incident, officers should_________ Correct Answer keep it factual and free of any outside influance The security industry distinguishes itself from law enforcement by being: Correct Answer protecting the property and reputation of the hospital What is the central component of an integrated security system? Correct Answer computer What is the rarest form of workplace violence? Correct Answer bulling The security profession separates itself from law enforcement by being: Correct Answer Proactive and focused on preventing crime Security is evaluated on what they do: Correct Answer Proactively prevent incidents Staff participation in crime prevention starts with: Correct Answer New employee orientation The two areas of safety and security inspections are: Correct Answer Hazard surveillance rounds and security surveys The results of hazard surveillance tour: Correct Answer are documented and reported to the safety committee The most economical design recommendation come: Correct Answer before construction takes place For healthcare institutions to provide customer service that motivates patients and visitors to tell about their facility, the level of expectation is Correct Answer excellance One of the ways hospitals can use to reach a patient first healing environment Correct Answer is to have multi-denomination chapels During a strike at the hospital, security can anticipate the following? Correct Answer picket lines formed on public sidewalks surrounding the facility When dispatched to an active shooter event the armed security officer should Correct Answer realize they can minimize casualties by taking successful actions The risk management department's responsibility includes: Correct Answer protecting its assets and medical information Which of the following is a voluntary accreditation agency recognized by insurance companies, government and healthcare providers? Correct Answer The Joint Commission The Joint Commission calls its evaluation system for risk a hospital facility could encounter? Correct Answer hazard vulnerability analysis To evaluate the possible negative effect on services provided for patients, staff and visitors, and the complications of the external environment on the hospital, institution use? Correct Answer proactive risk assessment What is the main element of an integrated security system? Correct Answer computer The chief function of an access control system is to allow control of access to areas and Correct Answer resources A---------reader is an example of -what you are-authentication Correct Answer CCTV camera The advancement of --- technology is most evident in the improvement of the resolution in security camera systems. Correct Answer Internet Protocol (IP) For life safety reasons, controls for doors secured by magnetic locks must be connected to the--------- Correct Answer fire alarm panel Critical incidents include fire, hostage taking/kidnapping and-------- - Correct Answer floods A security officer assigned to a call involving violence should Correct Answer only attempt a solo intervention when an immediate life threat is present and intervention does not pose undue risk One of security's duties after a critical incident is controlled, is to Correct Answer preserve the scene and gather evidance When a person encounters an incident or event so powerful that it threatens to overwhelm their ability to cope with feeling and emotions, they are experiencing? Correct Answer critical incident stress When writing a report related to a critical incident, you should--- Correct Answer keep it factual and free of any outside influence The designation professional security officer describes Correct Answer the way an officer performs For the security industry to be considered a "profession" it must have a ---- Correct Answer recognized body of knowledge The IAHSS adopt a ------- in 1981 as a critical element in the healthcare security profession. Correct Answer code of ethics The two Homeland Security Presidential Directives are Correct Answer management of Domestic Incidents and National Prepareness What do most security professionals agree that a primary function of the security department in a healthcare setting should be? Correct Answer Crime prevention. Inherent Susceptibility: Correct Answer A healthcare setting is a prime target for crime, because of how the business of healthcare works. Open access: Correct Answer Healthcare institutions traditionally provide an open access environment. This arrangement accommodates the huge numbers of people who come onto the property on a daily basis. Once in a healthcare facility, someone can easily pose as a visitor or contractor and go through many areas without being questioned. Presence of Valuable Item: Correct Answer A healthcare facility is susceptible to crime due to the wide variety of portable, marketable items used and stored there. More than 3000 items purchased by hospitals are usable in the home. Distracted Patients and Staff: Correct Answer Criminals know that patients and family members often are less aware of their surroundings due to the medical and emotional issues with which they are dealing. Criminals also see that the fast pace of the healthcare environment makes workers less aware as well. Whose personal safety is affected? Correct Answer Patients: If patients are concerned for their personal well being or the safety of their personal property their recovery may be affected. They may decide to get healthcare treatment elsewhere. Employees: he Safe Medical Devices Act and how to respond if equipment falls. Fire Hazards Correct Answer Obstructions in Corridors, Blocked Sprinkler Heads, Doors blocked open, Obstructed stairwells, and difficult to see exit signs. The members of the inspection team Correct Answer Members of the inspection team commonly include the following: Safety/Security Director, risk manager, environmental services manager, maintenance manager, and a representative from the nursing department. Crime analysis Correct Answer Crime analysis is one of the most important aspects of risk assessment and crime prevention. Crime analysis is the ongoing, systematic process of collecting, categorizing, analyzing, and disseminating timely and useful information regarding crime, crime patterns, trends, and potential suspects. What is the 5 step approach to crime analysis? Correct Answer 1. Collect the data. 2. Collate the data. 3. Analyze the data. 4. Disseminate the finding. 5. Gather and evaluate the feedback. What is the primary role of a security officer in crime prevention Correct Answer Reduce the opportunity for a person to commit a crime. Crime prevention is the anticipation, recognition, and appraisal of a crime risk. It also involves what? Correct Answer Initiating some action to remove or reduce the risk. What must be done about life safety deficiencies found in the hazard surveillance tour? Correct Answer Correct them immediately. What is the purpose of crime analysis? Correct Answer Identify problems and develop strategies to reduce problems. Identifying Customers Correct Answer A customer is any person with whom one has dealings. In a healthcare setting customers include patients, family member's, visitors, physicians, surveyors, social workers, and other individuals and agencies. What customers want Correct Answer Even though situations and customer motives differ, several points are common: Reliability and competence, responsiveness and empathy, making the customer feel valued. Attitude is everything Correct Answer First impressions are import, The impression you project affects how the customer react to you. Appearing professional, friendly, approachable, and positive makes you better able to meet the needs of customers. Key traits security personnel should have to deliver good customer service. Correct Answer Emotional awareness and concern, problem solving, initiative and responsibility, explaining and informing. What are the four basic elements of the Fish philosophy? Correct Answer 1. Choose your attitude. 2. Play 3. Make their day. 4. Be present be there. Choose your attitude Correct Answer When you choose your attitude for the day you take the responsibility that you are the one responsible for your attitude. Play Correct Answer When people are presented with an opportunity to be passionate about their work and express themselves creatively, play naturally happens. "Play" not only encourages camaraderie and good will, but also inspires innovative thinking. Make their day Correct Answer Creating a memory with each person you contact. Positive memories through creative interaction with your customers boost morale in both staff and customers. In these interactions, both staff and customer are engaged in what's going on. Be present Be there Correct Answer When interacting with a customer, you need to be present and focused on the client, rather than preoccupied with multi-tasking. Communication Correct Answer Effective communication is crucial in meeting the needs of your customers. Verbal communication Correct Answer Tone of voice, volume, and rate of speech. Non verbal communication Correct Answer according to Albert Mehabrian's research on communication 93 percent of any message is communicated through body language and tone of voice; 7 percent of what we actually communicate is verbal. The other's Perspective Correct Answer Communication is two sided. Assuming you understand someone's behavior without asking questions first is a mistake. Train yourself to ask different kinds of questions (both open and close) to understand situations. Other Unsafe Conditions Correct Answer Roof access portals and hazardous storage areas; Construction areas; Window Washers Overhead; What are 3 approaches to correcting security risks? Correct Answer 1. Attention to environmental design 2. Attention to the appearance of the property 3. Attention to access controls. Environmental Design Correct Answer Crime prevention through environmental design (CPTED) principals promote clear lines of sight. They aim to create a perception of safety and to make would be criminals feel they would be seen and detected when trying to commit a crime. Property's Appearance Correct Answer "Broken windows" theory holds that signs of a crime or neglect in an area such as graffiti or broken windows, create the impression that no one cares about the area or is watching the property. The appearance attracts more criminal activity to the area, starting a vicious crime cycle. Access Control Correct Answer Facility and building access controls are also key in minimizing security risks. Be diligent in looking for doors left open, breached fence lines, defective locking hardware, and doors that do not shut 5 or lock the property. Crime Risks on the Campus Correct Answer Activities conducted on the campus can also lead to dangerous activities associated with crime Some examples: Cash, drugs, and victims. Which legal test takes into account neighborhood crime rates, industry standards, and the owner's experience at other locations? Correct Answer Totality of circumstances. The major source of premise liability in healthcare is from __ Correct Answer Slips and falls Property owners have ___duty to maintain the property in a __ condition. Correct Answer legal and reasonably safe Which of the following are elements necessary to establish negligence in a premise liability case? Correct Answer Duty to the plaintiff, failure to meet the duty, breech of a duty caused an injury. Which of the following are examples of risks security officers should identify? Correct Answer Burned out lights, breached fence lines, slip and fall hazards. What are 4 methods of patrol Correct Answer Foot, Canine (K9), Bicycle, and motorized. What are some questions you should ask yourself before you start patrol? Correct Answer What has happen at the facility since the last tour of duty? What crimes or incidents have occurred and where? Have any "special orders" been issued that will have an effect on this shift? Have there been any physical changes to the facility? What areas are vulnerable? What can be done to enhance the security effort? Foot Patrol Correct Answer Foot patrol may not reduce crime in communities, but it can decrease citizen's fear of crime. Foot patrol is the oldest method of patrol. What are some positive results from foot patrol? Correct Answer Establish a visual baseline of the status of the campus; Build relationships and rapport with customers; offer a sense of safety through your physical presence; Be an informational resource and customer service ambassador; Be positioned to respond to emergency calls. What are some advantages of foot patrol? Correct Answer Uniformed officers provide visible crime deterrent; Cab be silent and catch people in the act; efficient method of patrol in a building when a K9 team cannot be used; highly effective method of patrol in densely populated areas; easily used in conjunction with another type of patrol, such as motorized vehicle; increases potential for positive customer relationships; least expensive method of patrol What are some disadvantages of foot patrol? Correct Answer Contributes more than any other method of patrol to excessive socialization( officer neglects duties by lingering too long in a particular department); officers may be perceived as wasting time or goofing off because the public cannot tell when one is taking a break or off duty; officers may congregate, reducing effective security coverage; can be less efficient in exterior areas when compared with efficiency of other methods of patrol. When did canine use in healthcare begin to increase? Correct Answer In the 1980's. A successful selection and screening process of a K-9 team includes the following: Correct Answer An officer committed to being a handler. An initial observation by a qualified trainer to determine how well the handler and canine react to each other. A visit to the handlers home if the canine will be housed there. A qualified trainer interviews the family, evaluates the home environment and the family's compatibility with the dog and determines if the property can accommodate the canine. The visit is also used to determine if the handler and family will care for the dog as the de facto owners. Completion of successful training of the handler and selected canine. Which of the following is not a recommended guideline when an outside conducts an undercover investigation? Correct Answer Insist that all security department staff receive operation information. Before using any covert monitoring devices the officer should do what? Correct Answer Review applicable state and federal laws. Which of the following is not a characteristic of a covert or undercover operations protocol? Correct Answer Formulated as an ongoing process. Arriving at a crime scene: Issues to address Protect yourself. Correct Answer Protect yourself- Be aware of your surroundings, and the people involved. Take time to assess the situation and ask yourself 3 questions: Is the perpetrator if violent still n the scene? Are physical hazards present that pose an immediate danger to you or another? Does the environment pose a threat (e.g. unsafe building, location, weather hazard)? Render aid to any victim. Correct Answer Once you have determined it is safe to do so, render aid to any injured party. Call for any necessary medical assistance. Notify a supervisor immediately. Ask for whatever assistance you may need. Protect the scene. Correct Answer Once the injured are being properly handled, protect the scene and any evidence it might contain. Photographing the Evidence- The Do's Correct Answer Use a photographic log. Take photographs from the outside in medium distance, and then close up of the evidence. When photographing evidence, take a second photo with a ruler in the picture for scale. Document photos in the order in which they were taken. Print hard copies of evidentiary photos. Burn copies of the photos to CD/DVD. Photographing the Evidence- The Don't Correct Answer Don't use one Secure Digital memory card (SD) for several cases. Don't use microphones on video equipment. Don't delete photos taken on a SD card being used for evidence: any gaps in the photograph file numbers must be documented. The following are examples of the kinds of information you may need to find and document: Correct Answer Who said what? What your personal observations were of the scene and those involved? Who performed what actions? Any evidence discovered or collected? What are the 3 different types of informants? Correct Answer Concerned citizen; Public domain; and "For personal Gain" informant. Concerned citizen informant Correct Answer A concerned citizen informant is the easiest to identify, cultivate, and control if you take the time and effort. The person's own morality and integrity, or a desire to correct a perceived wrong, motivates them to become an informant. Public domain informant Correct Answer People in these areas make it their job to gather information and make it available to the public. some examples of public domain informants are Newspaper, and social media. Personal-gain informant Correct Answer The personal gain informant is the type that stereo typically comes to mind (i.e. a stoolie, rat, turncoat). What approach should be followed to determine appropriate measures and security and safety practices for off campus facilities? Correct Answer Security inspections and risk assessments. What are three types of security-sensitive facilities that can be located off campus? Correct Answer Centralized information technology/information services, patients records storage, and home healthcare worker services and programs. What are four of the most important protective measures and security and safety practices for off campus facilities? Correct Answer Ensure there are appropriate security policies and training, personnel and security systems in place for employees, and security officers working the off-campus location. What are three ways off-campus workers can communicate security emergencies? Correct Answer Cell phones, overhead paging systems, and pagers. Which of the following are part of the security officer's role in providing security services and protective measures at off- campus locations? Correct Answer Conduct the security risk assessments to determine what security protections are required at off-campus facilities. Be alert to, identify, and report specific situations that encourage or make crime more likely at off-campus facilities. Workplace violence is defined as any behavior in a work environment that a reasonable person finds what? Correct Answer Intimidating. The Federal Bureau of Investigation characterizes workplace violence into how many broad types? Correct Answer Four. Which of the following is a challenge encountered by the healthcare security when dealing with a VIP? Correct Answer Increased access control, patient privacy, and news media. What is the term used to describe individuals who pose as licensed healthcare providers? Correct Answer Medical imposters. The Joint commission is a _____ accrediting authority recognized by government agencies, insurance companies, and healthcare providers. Correct Answer Voluntary. The mechanism used to evaluate external potential adverse impacts on the hospital is called____? Correct Answer Proactive risk assessment With regard to security in women's service areas, the standards of the Joint Commission and guidelines of the National Center for Missing and Exploited Children are what? Correct Answer Mutually supportive. After the healthcare organization has identified the list of potential threats, prioritized the list, and selected those that would affect the facility, it must do what? Correct Answer Implement procedures and controls to reduce or eliminate areas of vulnerability. Beginning in January 2008, under the Joint Commission's Emergency Management Standards the increased responsibilities of security include what? Correct Answer Identifying the role of law enforcement and the National Guard at the facility during emergencies. Electronic Security Technologies Correct Answer In a process known as convergence, both the security and information technology (IT) departments work together to deploy and apply security technologies. Today's technologies allow for interoperability and integration between other systems The Integrated Security System Correct Answer An electronic integrated security system brings together several sub-systems. Individual security systems can be combined and function in an integrated electronic system: Access control systems Alarm systems Surveillance systems Speaker system Patient monitoring systems Patrol verification systems Time and attendance systems To ensure reliability of operations, each sub-system performs multiple functions. Access Control Systems Correct Answer Controls the movement of people: Provides controlled movement through a combination of intelligent barriers, access control, and effective procedures. The system is customized to only allow access to authorized personnel. The system can be set up with time, day, and authorization levels. Components of an access control system may include: A computer-controlled system Access cards and card readers Biometric access control Electronic locks Integration with other systems include: Monitors and alarms Lock activation and de-activation Video imaging system for ID cards: Includes a database of security access information Can be also be put into use at off-site locations Intrusion Alarm Systems Correct Answer Provides notification of physical condition changes Proprietary alarm systems may be monitored by on-site by security or other departments: Can rapidly identify and respond to alarms Eliminates third party in the notification process May be more cost effective Security and alarm monitoring can also be contracted to an outside company: May be more expensive Response may not be as rapid Closed- Circuit Television Systems Correct Answer A CCTV has several uses in security: Access control (verification) General surveillance Alarm activation Advanced video analytics Archiving for forensic evidence and review Integrating CCTV with access controls adds to the effectiveness of the security force. Integrating Secondary Sub-Systems Correct Answer Fire and other emergency alarm systems Elevator control Patient protection systems (for infants and wanderers) HVAC and other building systems