Guidance on the security and management of NHS assets

Transcription

Guidance on the security and management of NHS assets
Guidance on the security and
management of NHS assets
May 2012
Tackling fraud and managing security
Guidance on the security and management of NHS assets
Contents
Executive summary
3
1. Introduction
5
The purpose and scope of the document
NHS assets
5
6
2. Understanding the lifecycle of an asset and issues of vulnerability
7
Procurement and purchase of the asset
Delivery and deployment of the asset
Inventories and registers
Use of the asset including storage, maintenance and repair
Returning, decommissioning, disposal and sale of assets
Auditing as part of monitoring and reviewing the security of assets
Reporting
8
8
8
9
9
10
10
3. Risk assessing NHS assets
12
4. Security response for protecting NHS assets
14
Pro-security culture
Staff roles and responsibilities
Identification badges and security passes
Security of buildings
Incorporating security within the design of buildings
CCTV systems
Access control
Integrated security systems
Key management and control
Security marking and asset tagging
Fraud reporting
Appendix 1
Checklist for assessing risk to NHS assets
14
14
15
16
16
17
17
18
18
19
20
21
Appendix 2
Policy template for the security and management of NHS assets
24
Appendix 3 Consultation questions
33
2
Executive summary
The NHS spends approximately £4.6 billion of its budget on equipment and consumables,
and has an annual spend of £50 million on high value capital equipment. It is clear that
assets represent an important class of expenditure for the NHS and any theft or loss can
place a huge financial burden on NHS health bodies, as well as having a significant impact
on the delivery of healthcare and depriving the NHS of resources which would otherwise
contribute to patient care.
In the current economic climate and at a time when NHS health bodies are expected to
demonstrate value for money, all NHS health bodies and their staff should ensure their
assets are protected and secured properly.
NHS Protect has produced this guidance to provide practical advice and support to all NHS
staff and managers on how to protect and secure NHS assets against theft, loss or damage.
This document provides the necessary tools to enable NHS health bodies to risk assess
their assets and identify appropriate ways to help protect and secure them.
Section 1 introduces the aims of the guidance document, gives a description of the assets
to be protected and briefly discusses the complexities of the subject.
Section 2 discusses the different stages of the life of an asset as it is procured, used,
disposed and decommissioned and highlights the vulnerabilities at each of these stages.
The section goes on to highlight what steps should be taken at each stage to protect and
secure assets including the reporting of assets that are stolen or lost.
Section 3 provides practical advice to NHS health bodies on how to conduct a risk
assessment of their assets in order to help determine the type and level of security
measures required for their protection. As well as giving advice on asset management and
the importance of auditing assets on a regular basis, the section explains the key concepts
involved. This includes a checklist for assessing risk to NHS assets (Appendix 1), which
NHS health bodies can use to conduct a risk assessment to identify the assets to be
protected, the threats/vulnerabilities and identify potential security solutions.
Section 4 of the guidance examines the security response to protect NHS assets. Most
NHS premises will already have some physical security measures in place; however these
are only as effective as the staff using them. Starting with the roles and responsibilities
everyone (staff and managers) has for protecting and securing NHS assets, the guidance
looks at the different roles within the organisation with regard to keeping assets secure and
the development and maintenance of a pro-security culture. This section also discusses how
access to the asset can be managed and controlled with some of the more commonly used
security measures already in use within NHS premises. Finally, Appendix 2 provides a policy
template to assist NHS health bodies in the development of local policies and procedures for
the security and management of NHS assets.
This guidance document should be used as a template to help develop and implement local
procedures and systems to promote the security and better management of NHS assets.
Implementation of the guidance should take account of local environments and work
activities in the way assets are used and managed.
The guidance aims to be as comprehensive as possible, but inevitably it may not cater for
every situation within the working environment. It is a living document and will be updated
when new developments occur. NHS Protect will be issuing further updates to this document
in relation to protecting portable NHS equipment and NHS equipment issued to staff.
3
We hope that NHS health bodies will find this document useful in ensuring their assets are
secured and properly managed at all times.
4
1.
Introduction
1.1
NHS organisations are under pressure to make efficency savings and with an
estimated spend of £4.6 billion 1 of the NHS budget on equipment and consumables
and an annual spend of £50million 2 on high value capital equipment, there is a
greater need for NHS organisations to secure their property and assets from theft,
loss and damage. However, as reported in the media, NHS property and assets have
been targeted by thieves, with autopsy tables, defibrillators, laptops and lead from
hospital roofs among the items stolen.
1.2
It is difficult to calculate the precise amount of overall losses to the NHS, as not all
losses are reported. For example, many staff members simply replace missing items
without reporting or recording them as lost or stolen, or they may not always know
how to report a theft or loss.
1.3
There is also the issue of NHS accounting rules, which define assets in purely
financial terms as items with a value exceeding £5,000. Many NHS health bodies
only include items of this value or above on their asset registers, which leaves a wide
range of smaller, portable, valuable items without any means of security protection,
management or audit arrangement.
1.4
However, ensuring the security of NHS assets, regardless of their size, use or value
is extremely important. Good crime prevention measures and effective asset
management can help contribute to the provision of good patient care and the
achievement of greater financial efficiencies.
1.5
The way in which assets are used, distributed, managed and audited varies
considerably from one organisation to another, making it a complex issue to address.
Even within the same organisation, practices may vary between departments.
1.6
Assets may not even stay within the organisation or be on site all of the time. They
can be loaned to other NHS health bodies and to patients, or taken off site for
maintenance and repair. Equally, the financial or operational value associated with
the asset, its size and portability can make it more susceptible to being stolen,
damaged or lost. These issues can lead to difficulties in determining how best to
secure and protect an NHS asset.
The purpose and scope of the document
1.7
The purpose of this guidance is:
• to provide practical advice and support to all NHS staff and managers on how
to protect and secure NHS assets against theft, loss or damage;
• to assist those responsible for the security management of NHS assets to
develop appropriate local policies and procedures;
• to help reduce the number of assets stolen, damaged or lost from within the
NHS;
• to assist NHS health bodies in meeting their statutory obligations to provide a
1
National Audit Office, The procurement of consumables by NHS acute and Foundation trusts, 2011.
Figure relates to an average annual spend on magnetic resonance imaging (MRI) and computed
tomography (CT) scanners and linear accelerator machines for cancer treatment. National Audit
Office, Managing high value capital equipment in the NHS in England, 2011.
2
5
safe and secure environment, and enable them to provide evidence to NHS
regulators that appropriate measures are in place.
1.8
The guidance has been designed to be used as a template from which local
procedures and systems are developed, revised or enhanced to protect and secure
NHS assets. These measures should reflect local needs and at the same time
ensure that the organisation meets its statutory obligations to provide a safe and
secure environment. While the guidance aims to be as comprehensive as possible, it
may not cater for every situation within the working environment.
1.9
The guidance takes account of the Health and Social Care Act 2008 (Regulated
Activities) Regulations 2010 Essential Standards, which providers of health and adult
social care are required to meet in order to register with Care Quality Commission
(CQC).
1.10
Under the regulations, providers must ensure that “equipment is available in sufficient
quantities and stored safely and securely to prevent theft, damage or misuse”
(Regulation 11A). The regulations also state that providers must “ensure medical
devices are available when required and are disposed of or recycled safely and
securely” (Regulation 11F).
1.11
The guidance also takes account of the work of the NHS Litigation Authority
(NHSLA), which handles negligence claims and works to improve risk management
practices across the NHS. Member organisations are regularly assessed against the
NHSLA’s standards. This guidance takes into account the particular standards NHS
health bodies are expected to meet in relation to managing the risks associated with
the physical security of premises and assets.
NHS assets
1.12
Within the NHS, the terms ‘property’ and ‘assets’ are used interchangeably to
describe NHS-owned items. For the purposes of this guidance, we have chosen to
focus our work on the following classes of goods:
• medical and non-medical equipment
• consumables
• supplies
• NHS staff personal issue equipment
• fixtures and fittings.
1.13
Collectively we will refer to these items as ‘NHS assets’, which will be the focus of
this guidance. The recommendations in this document will also apply to those items
that are donated, loaned and leased.
1.14
Personal property, including staff and patient possessions, also needs to be
protected to help create an environment for those who use, visit or work in the NHS
that is safe and secure. This will be dealt with in a separate guidance document.
6
2.
Understanding the lifecycle of an asset and issues of
vulnerability
2.1
‘Asset lifecycle’ refers to the various stages an asset will go through, starting with its
acquisition through to its decommissioning. At each stage, the asset is likely to be
exposed to different security risks. These will need to be managed carefully by the
organisation and by whoever is ultimately responsible for the asset.
2.2
The diagram below highlights the key stages in the lifecycle of an asset and
illustrates the importance of regular auditing as part of the review process.
Figure 1: Lifecycle of an asset and its relationship to audit.
1. Procurement
and purchase
of the asset
AUDIT
2. Delivery and
deployment
AUDIT
AUDIT
5. Return,
decommission
and disposal of
the asset
3. Asset use
AUDIT
4. Maintenance
and repair
AUDIT
7
Procurement and purchase of the asset
2.3
The process by which organisations purchase their items may vary according to the
department purchasing the asset, the value of the asset, the quantity being
purchased and/or the type of asset it is. However, it is certainly worth considering
what security measures might be put in place at the procurement and purchase
stage. For example, tender specifications could include a requirement for contractors
or suppliers to demonstrate how they propose to enable the asset to be made secure
or arrange for specific security measures to be built into the product from the outset. Where possible, property should be indelibly security-stamped with the organisation's
name and post code. This should always be considered for electrical, portable and
other desirable items.
2.4
Any asset at this stage should enter the organisation’s own asset management
system and begin to be managed accordingly. Asset management systems can
either be computerised or paper-based, and include management policies,
procedures and practices specifically designed to protect or secure the asset. In
essence, the procurement process should feed into the asset management system,
providing data on the new asset as soon as the purchase order is complete and the
item has been received. This will enable proper and accurate tracking of the item.
Delivery and deployment of the asset
2.5
The organisation should have in place effective policies with regard to the delivery of
goods and adequate procedures for logging and tracking assets from the point of
receipt to the point of delivery to the end user. It is often during this period that assets
are most vulnerable. For example, stock should not be left in open-access areas, and
should be kept secure at all times.
2.6
NHS assets should be held on an inventory or register, in accordance with the NHS
organisation’s Standing Financial Instructions. Assets valued over £5,000 are usually
recorded on a corporate asset register.
Inventories and registers
2.7
In addition, each department, and smaller NHS providers such as GP practices,
should hold their own local asset/equipment register, ensuring it is kept up to date
and reviewed on a regular basis. The register should record the following information:
• the department/division/business unit
• name of the individual responsible for the management of the asset
• type of asset, model and serial number, description and quantity
• summary of the risks and assessment results
• security measures
• date of review.
2.8
If the asset is to be stored for any length of time before final delivery, access to the
storage area should be restricted and the area secured.
2.9
Once the asset has been delivered to the relevant department or individual, there
should be a system in place to ensure it is signed for and that this action is recorded
on the asset management system. The person receiving the item should then take
the necessary steps to ensure that it is properly secured. A risk management model
8
can be useful for identifying threats and vulnerabilities and determining the security
response needed to secure the asset. This is discussed in section 4 below.
Use of the asset including storage, maintenance and repair
2.10
Depending on the nature of the asset, it is likely to be used in a variety of different
ways and settings. For example, it may be used by an individual member of staff
within a particular department or given to a patient. In some cases it might be shared
across several departments/ divisions or even used by another local healthcare
establishment.
2.11
Set policies and procedures should be developed to deal with these various
scenarios and ensure that the asset is properly managed throughout its usage.
Attention should be given to how the item will be stored securely when not in use,
what should happen if it is relocated or loaned to another department and how it will
be tracked and audited.
2.12
NHS health bodies may need to consider what arrangements they have in place for
the maintenance and repair of items, especially in cases when an item is likely to be
taken off-site for these purposes. Added security measures may be required and an
appropriate log should be kept of what is taken off site, where it has gone and when it
is due back.
2.13
The risk assessment process discussed in section 4 should help to ensure the steps
taken are appropriate and proportionate to the vulnerabilities identified.
Returning, decommissioning, disposal or onward sale of assets
2.14
An asset can have a residual value at the end of its lifecycle and it remains the
property of the organisation until it is finally returned, decommissioned, disposed of
or sold. Managers and staff should familiarise themselves with the organisation’s own
specific policies and procedures in each case. This will help them establish what
should be done with the asset once it has completed its lifecycle.
2.15
In each case, security considerations remain important. For example, accurate
record-keeping is particularly important for tracking purposes, especially if the asset
needs to be returned to the issuing department or sent elsewhere by a specific date,
e.g. end of a contract period/lease.
2.16
It is also important to ensure the asset can no longer pose any risk to the
organisation or patients. Sensitive and confidential data must be removed from all
technological equipment such as laptops and mobile phones before they are
redeployed or decommissioned. Where the data is still required, it should be
transferred in the appropriate manner to another system for storage.
2.17
Medical equipment that is no longer fit for use must be disposed of in an appropriate
manner and in line with guidance from the Medicines and Healthcare Products
Regulatory Agency and legislation such as the Waste Electrical and Electronic
Equipment (Amendment) Regulations 2007. Items that are to be sold should have all
the health body’s security markings, identification and logos removed before being
sold and should still be compliant with all relevant health and safety requirements.
Depending on the health body’s own policy, it may be necessary to seek the
appropriate authorisation before the sale of an item can proceed.
9
2.18
Human Resources (HR), Finance, and Heads of Departments may wish to be
informed when an asset or an item of staff-issued property is no longer required, or
when the responsibility for the asset is to be transferred. For example, a mobile
phone may still have an outstanding contract which will need to be cancelled, or it
could be reissued to another member of staff. Managers and staff may wish to
consult with HR and finance departments on these matters, as suitable local
arrangements may already exist.
Auditing as part of monitoring and reviewing the security of assets
2.19
Figure 1 above illustrates that auditing should be conducted on an ongoing basis as
part of a monitoring and review process. This should be conducted by the most
relevant or authorised individual. Regular auditing can help to identify any
discrepancies and ensure action can be taken at the earliest possible stage to
reconcile them.
2.20
Auditing may also help to identify particular patterns or trends, and which assets are
most vulnerable. Without proper auditing, it is difficult for any organisation to know
whether they are experiencing problems in asset management or the scale of the
potential problem they are facing in relation to assets being stolen, damaged or lost.
2.21
As a minimum, standard audits should be conducted once a year to review the
security measures and to check the health body’s assets against the register.
However, depending on the risk assessment, the assets which are considered more
high-risk should be audited more frequently. For example, endoscopes (which are
used to examine the inside of a person’s body) are particularly expensive, portable
and easily concealed. Theft of these items would have an impact on business
continuity and affect patient care, as NHS health bodies would be unable to carry out
routine investigative medical procedures. For items such as these, where regular
cleaning and servicing is required, monthly audits should be undertaken to find out if
any of the items are missing.
Reporting
2.22
Where discrepancies are revealed in any audit, they should be reported to managers
and senior staff. Organisations should have a reporting system in place to enable the
reporting of such incidents. In the event of a suspected theft or actual loss of an NHS
asset, the staff member or manager should notify the Local Security Management
Specialist (LSMS). The LSMS is trained and accredited to undertake investigations
involving thefts and security incidents. NHS Protect provides central support and
guidance to LSMSs on security management issues within the NHS Security
Management Manual 3 . The police should also be notified as per the organisation’s
policy, particularly in the event of theft, burglary, vandalism or any criminal damage to
NHS property.
2.23
The matter should also be recorded as a security incident on the organisation’s
incident reporting system and the local notification/alert process should be initiated.
NHS Protect should also be notified of all security incidents involving the theft or
damage to NHS assets, including those investigated by the police. NHS Protect has
launched a security incident reporting system to record all theft or criminal damage
(including burglary, arson and vandalism) to NHS property and assets. The aim of
this system is to inform NHS Protect’s prevention and deterrence work, help identify
3
The NHS Security Management Manual is a restricted document; access is only available to
accredited LSMSs through a secure extranet, hosted by NHS Protect.
10
trends and patterns, generate statistics and enable NHS Protect to build a national
picture of security management across the NHS.
11
3.
Risk assessing NHS assets
3.1
In order to provide the best protection of NHS assets, a thorough and systematic
assessment of risks and threats needs to be undertaken. This assessment will help
to identify those assets most at risk and provide a greater understanding of existing
threats. Using this information, it is possible to develop the most appropriate security
solution for protecting and securing the asset.
3.2
Risk management is already widely practised within NHS organisations. The process
is no different when applied to the risk management of NHS assets. Where possible,
NHS organisations should build on their existing systems to avoid duplication of effort
or creating systems that are difficult to maintain. It may be possible to adapt existing
risk management systems to best suit the organisation’s needs rather than create a
new system.
3.3
The diagram below (Figure 2) illustrates a general cycle of risk management applied
to NHS assets.
Figure 2: Cycle of risk management.
Asset
valuation
Vulnerability of asset
Risk and threats
Impact
assessment
Monitor and
review
Safeguard assessment
and security
Risk
determination
3.4
Every asset has a monetary value. NHS organisations usually have standard
policies for the management and security of assets above certain levels of financial
value. NHS organisations should review existing policies and asset
inventories/registers, before deciding on whether to introduce any new systems.
3.5
However, an asset has more than just financial value. Its theft, damage or loss can
have a critical impact on the delivery of services and patient care or treatment. Thus,
it is also important to consider the asset’s criticality to business operations, and what
impact its loss would have on patient care, business continuity and the reputation of
the organisation. Naturally, over time the value of the asset is likely to decrease, both
financially and in terms of useability. Any valuation will also need to take these
factors into account.
3.6
The first stage of the risk assessment process consists in identifying what assets the
organisation/department has, and understanding their vulnerability. This is
determined by how likely it is that someone could steal or damage a particular asset;
12
and how often such incidents are likely to occur. The next stage is understanding the
impact such a loss or damage might have. Factors to consider include:
• extent to which the asset is exposed to potential loss or damage
• financial cost of the potential loss or damage
• severity of the potential loss or damage of the asset on patient care and safety
• severity of the potential loss or damage of an asset on business operations and
service continuity
• likelihood of injury/loss/damage occurring as a result of the asset’s loss or
damage
• number of people/amount of property at risk
• damage to reputation
• strength of existing mechanisms to protect the asset.
3.7
To assist with establishing a profile of the asset, Appendix 1 contains a checklist for
assessing the risks associated with an asset. Once this has been completed, it
should be possible to develop an appropriate action plan to prioritise which assets
need to be made safe and secure immediately and to determine the appropriate level
of security protection required.
3.8
Naturally, eliminating the risk altogether is the most effective way of protecting NHS
assets. However, there may be budgetary or physical constraints involved and in
most instances it is more realistic to focus on the most critical assets first and seek to
minimise the risk to the lowest practical level.
3.9
It is important to note that adequate control of risks can only be achieved through the
co-ordinated action taken by all members of the organisation. For this to occur, all
staff members need to be aware of their role and responsibility with regard to the
security of NHS assets. This is discussed in section 4.
3.10
It is also important to build appropriate links and consult with relevant stakeholders
from the outset. This may include staff, clinicians, patients, visitors or external
organisations such as the police, community groups or voluntary organisations.
Stakeholders can often provide vital local information that may not always be
immediately evident or readily available. The LSMS is also an important stakeholder
in assessing risk. They can provide practical advice and support to individual
departments and managers on assessing security risks for their assets and on the
range of security measures available to secure the items.
13
4
Security response for protecting NHS assets
4.1
Many NHS premises will already have in place some level of physical security
measures such as locks, alarms and access control systems. However, depending
on the type of asset and its identified risks and vulnerabilities, higher levels of
security may be required.
4.2
As a baseline, there should be a minimum level of security in place to protect any
asset. In most cases, this will include basic ‘good housekeeping’ such as, keeping
communal areas clean and tidy, securing items away after use and ensuring doors
and windows are locked out of hours. Encouraging staff to observe these basic
measures contributes to a strong pro-security culture.
4.3
At the top end of the spectrum, certain NHS assets may require more specialist
security solutions such as security marking or asset tagging systems. However, the
use of specialist solutions should always be based on a thorough risk assessment,
otherwise it can prove to be an expensive and unnecessary investment. More
common security measures to consider include good security lighting and integrated
security management systems, which combine individual components of physical
security such as access control, alarms and CCTV within one system.
4.4
As discussed at 2.22 above, the LSMS is a trained and accredited security
management specialist and can provide advice on security solutions for protecting
NHS assets. The LSMS can undertake security surveys to help identify any security
risks and potential breaches. They can also provide specialist advice on physical
security measures and undertake post-incident reviews.
Pro-security culture
4.5
A pro-security culture among staff (including temporary staff and contractors),
patients and visitors is one in which the responsibility for security is accepted by all
and the actions of a small minority who breach security are not tolerated. A key
element of a pro-security culture is encouraging staff to take an active part in creating
and maintaining a secure environment. This is usually done through practical
measures such as staff inductions, awareness campaigns and regular updates and
briefings on security matters. This is a key function of the LSMS role. In the absence
of a strong pro-security culture within an organisation, any protective measures put in
place are more than likely to only partially achieve their intended outcome. At worst
the measures may fail altogether.
Staff roles and responsibilities
4.6
4.7
All staff should be reminded of their role and responsibilities in protecting and
securing NHS assets and receive regular training and support on this issue. While
ultimate responsibility for NHS assets lies with the Chief Executive of each
organisation, this responsibility is also shared by individual managers and staff
who oversee and use the organisation’s assets.
The Chief Executive and Board of the organisation must ensure that the
appropriate policies and procedures are in place for the secure management and use
of its assets. This includes having an asset management system in place to manage
and control assets, as well as ensuring that suitable arrangements exist to report any
incident involving theft, loss or damage of NHS assets.
14
4.8
Managers and department heads should ensure that their staff adhere to the
organisation’s policies and procedures for the use of assets, and that their
department’s assets are entered onto the asset management system, or local asset
register as appropriate. They should seek to ensure their records are kept up to date
and regular audits are undertaken.
4.9
Staff members should ensure they use the organisation assets in the appropriate
manner and in accordance with applicable policies and procedures, and that they
report incidents as they occur.
4.10
The organisation’s induction process and its own security policies should help to
support this process, and all staff should be given access to the relevant policies.
During training, staff should be made aware of any assets or equipment they will be
using, how it should be kept safe and secure, and what they should do if it is stolen,
lost or damaged in any way. Appendix 2 of this document provides a policy template
for NHS health bodies to develop their own policy for the security of NHS assets.
Identification badges and security passes
4.11
The proper identification of staff and contractors is essential in helping to protect
NHS assets. A staff ID badge and security pass system enables NHS health bodies
to ensure that only those who have proper business on a healthcare site are allowed
access. However, this relies on staff compliance with the organisation’s policy on
staff identification and security passes for visitors/contractors.
4.12
Unauthorised access may result in the theft and damage of NHS assets, or even
assaults on NHS staff. Each NHS health body should have in place a system of
photo identification for permanent, temporary and contractor staff who work in the
healthcare environment on a regular basis. This should work alongside a system of
security passes for those who attend infrequently.
4.13
Where possible, identification badges and security passes should be part of an
overall security solution and ideally they should be linked to an integrated access
control system. The identification badge/security pass system should also have
strong links to HR processes, so that information on starters and leavers is
reconciled with access permissions. The system should also be monitored and
reviewed on a regular basis to ensure compliance and modifications should be made
when necessary. The LSMS should have oversight of the implementation and
maintenance of this system and incidents of abuse or weaknesses should be
reported to them so that further deterrent and preventative measures can be put in
place.
4.14
Staff should be issued with appropriate identification badges. Contractors and site
visitors should be escorted to and from their location and wear clearly marked
‘temporary’ security passes, which need to be signed and recorded on issue. Having
colour-coded passes for staff, visitors and contractors is a good way for staff to easily
identify individuals especially if they are in a restricted area.
4.15
Staff should be encouraged to challenge or report anyone not displaying staff
identification or a security pass to the appropriate authority or security personnel
immediately. NHS health bodies should consider introducing a security pass/photo
identification system if one is not already in operation.
15
Security of buildings
4.16
It is the responsibility of all staff working in NHS premises to keep their work area and
buildings secure. This will be achieved by individuals ensuring, when they enter and
exit a building or secure area, that the door is secured and they do not allow
tailgating 4 . Staff should not prop open fire doors or disable access-controlled doors,
and at the end of the day/shift windows should be secured, particularly those located
on ground floors, as these can provide easy access to unauthorised individuals. All
staff can also contribute to the protective security of their area by challenging and
denying access to those who cannot present a valid or legitimate reason to enter the
premises. This is particularly important in areas of high risk to people and where
high-value equipment or assets are located, such as endoscopy suites and theatres.
4.17
Some smaller providers, or parts of larger organisations, are based in a multioccupancy building or in premises within a shopping centre, high street or business
park. Where this is the case, security should be a joint effort. For example, common
access control procedures can be agreed or CCTV cameras sited for maximum
overall benefit to all occupants of the building/area. This can both increase
effectiveness and greatly reduce costs, while ensuring that health and safety
regulations, fire prevention requirements and building consents are met.
4.18
It is good practice to have a standard operating procedure (SOP) for buildings and
areas that are not staffed 24 hours a day/7 days a week. In some smaller premises,
staff members (other than security personnel) may have the responsibility for
securing their areas at the end of the working day and they will need to know what to
do. In these circumstances, the relevant staff should familiarise themselves with the
SOP for securing the area. The SOP should include guidance on setting alarms (if
relevant), how to check and lock all entrances/exits and ensure windows are locked;
as well as explaining how to secure valuable and portable assets and confidential
material. For office areas, a clear desk policy should be enforced to ensure that all
protectively marked documents are securely locked away. Random security patrols
(if available) are also a good way of checking the security of premises and to act as a
visible deterrent to would-be criminals.
Incorporating security within the design of buildings
4.19
When a healthcare building is being newly built or refurbished, measures should be
incorporated into the design to help protect the safety of staff, patients and visitors
and the security of the premises and the assets contained within them. The project
team should discuss security with the local police crime prevention design advisor
(CPDA) 5 and the LSMS at an early stage in the design process. The LSMS will be
able to identify specific security risks and offer advice on measures that can be
implemented to reduce them. The CPDA can provide free information and advice on
how to build to Secured by Design 6 specifications and reduce crime through
environmental design. Further information on Secured by Design and contact details
of CPDAs can be obtained from www.securedbydesign.com. Both the CPDA and
the LSMS will be able to provide advice on the particular security industry standards
and specifications which the healthcare building will be expected to meet.
4
Tailgating can be defined as gaining unauthorised access by following an authorised user through a
secure door.
5
Crime Prevention Design Advisors are also known as Architectural Liaison Officers.
6
Secured by Design is a crime prevention initiative managed by ACPO CPI Limited on behalf of the
UK Association of Chief Police Officers.
16
4.20
The local fire officer and LSMS should be consulted in conjunction with each other to
avoid the possibility of the demands of security and fire safety conflicting.
4.21
Natural ventilation and night-time cooling of spaces should not compromise security
measures.
4.22
Natural surveillance can assist in the deterrence and detection of crime and
contribute to a secure environment. The building’s design should promote natural
surveillance and good visibility by enabling staff to observe their working areas
without any fixtures or structures impeding their sightlines.
4.23
Research has shown that good levels of lighting can be effective in reducing the fear
of crime and in some instances, result in crime reduction. Lighting schemes should
ensure there are no dark corners or areas that could be used as hiding places. They
also need to take account of CCTV systems, as lighting can help or hinder the
identification of individuals on TV screens.
4.24
Any plans to install CCTV or expand an existing system should be discussed with the
LSMS.
CCTV systems
4.25
The installation of overt and well-publicised CCTV cameras should be considered for
areas where there is an identified security risk. This may include public areas,
entrances and exits (which may or may not be access controlled), staff-only areas
and circulation routes within high risk clinical departments such as operating
theatres, maternity, neonatal and paediatric units and theatres.
4.26
The use of CCTV in healthcare premises as part of an overall integrated security
strategy can help to deter, prevent and detect security-related incidents, as well as
providing evidence for investigations following an incident. This is discussed further
in 4.30. CCTV can be intrusive and its operation must comply with the provisions of
the Data Protection Act 1998 and the CCTV code of practice (Information
Commissioner’s Office, 2008), which is available at
http://www.ico.gov.uk/upload/documents/library/data_protection/detailed_spec
ialist_guides/ico_cctvfinal_2301.pdf
Access control
4.27
Access control can either be a standalone or electronic controlled system which
controls entry through the use of physical barriers. In the simplest form it requires a
means of identifying people, providing access according to a set of rules and when
necessary preventing access. Commonly, access control measures are likely to be a
combination of physical security measures, e.g. locks or magnetic swipe/proximity
card access, and processes, e.g. a guardian such as a receptionist or security officer
checking identification and controlling access to authorised personnel/visitors.
Organisations are advised to regularly audit, review and maintain their access control
measures and procedures. Access control measures work best when used properly
by staff.
4.28
Access to staff-only areas, restricted clinical areas (i.e. controlled by staff) and
storage rooms containing valuable medical equipment and consumables should be
locked or controlled via close-proximity cards or similar devices.
17
4.29
Good signage can also provide a deterrent effect and support such systems, e.g.
signs indicating restricted access or staff-only areas.
Integrated security systems
4.30
Physical security measures such as access control, alarms, CCTV and security
tagging assets are commonly used to deter crime, detect offenders and delay their
actions. Combining these separate security measures into one integrated security
system can provide many benefits in terms of cost effectiveness and achieving a
more efficient monitoring system. An integrated security system can be very effective
in protecting assets because of the ability of separate security components to interact
with each other to provide maximum security. For example, if someone without the
right level of access permission attempted to gain access to a restricted area or an
alarm is activated, the system would automatically re-position CCTV cameras to
capture images of the area and individual, access controls could be applied to limit
their movement and security staff could be alerted to attend the area.
4.31
The type of system required will depend on a number of issues, as these systems
differ in their complexity. Linking existing security components will depend on
whether they are compatible, require upgrading and how they are managed and
maintained. However, in any new build or refurbishment of NHS premises, it is
always worth considering the benefits of an integrated security system. In planning
for the implementation and installation of an integrated security system, the LSMS
should undertake an operational requirement that will determine the system
specification. Estates and IT departments will need to be consulted as part of this
process, as it will require their involvement on whether the system can be integrated
into the building management system and existing IT structure. Any system
implemented will need to be future-proofed for software upgrades and the addition of
further security hardware.
4.32
Intrusion detection technology can also play an important part in any integrated
security system. It is as much a deterrent as a means of protection. However, if a
police response to an alarm is required, the system must be compliant with the
Association of Chief Police Officers’ Security Systems Policy. For further information,
contact should be made with the Alarms Administration Office at the local police
headquarters. The NHS Security Management Manual also provides advice to
LSMSs on the use of these systems.
4.33
All of the systems and procedures discussed above need to be regularly reviewed
and updated, as they all contribute to the overall security of the organisation’s
property and assets.
Key management and control
4.34
Where individuals are given key holding responsibility, keys must be kept in a secure
cabinet in a secure location (locked room within a supervised area) and on sealed,
numbered rings with no other means of identification. Key holders should be advised
that they are not to duplicate keys and made aware of the NHS health body’s
protocol for reporting lost or missing keys. If the lost or missing keys are for a high
risk area, extra precautions should be taken to ensure that a secure environment is
maintained.
4.35
A system should be established for the distribution of keys which includes an audit
trail that shows how keys are managed and used. It should also allow for
identification of the last user of each key. As part of the system to manage the keys,
18
a regular inventory should be undertaken of the keys in possession of
individuals/departments. The frequency of the inventory should be determined
following a risk based approach. For example, if the value of the asset is high or the
impact on the health body of the asset being stolen, damaged or lost is significant,
then an inventory of the keys for the relevant area will be undertaken daily.
4.36
There are now secured key cabinets that can provide an electronic audit trail and
only provide access to authorised users. However the use and implementation of this
type of system can be costly. Organisations are advised to undertake a risk
assessment and cost benefit analysis before considering such an investment. The
LSMS should be involved in this process.
4.37
Original and duplicate keys should be held securely by a main reception/security
control. The keys should be under the control of an authorised individual, who will
account for any keys in their possession by use of a key book or safe, and act as the
contact for issue of any duplicate keys required in an emergency. All keys kept at
main reception/security control should be signed for on issue and the identity of the
signatory verified using the organisation’s ID card and checked against the list of
those authorised to withdraw the key.
4.38
There should be much stricter controls around the access to, and use of, master keys
which open all the locks of a particular set. In the event that a master key is to be
used to provide access, its use should be supervised. Key holding responsibility for
master keys should be limited to a small number of staff.
4.39
Lists of authorised key holders should be regularly reviewed to reconcile them with
information on starters and leavers with key holding responsibility. This should be
closely coordinated with the HR department. Ideally, the key holding authorisation
lists should be updated every three to six months or determined by local risk
assessment. However, in the event of a staff member with key holding responsibility
being investigated or leaving the organisation abruptly due to suspension or other
disciplinary action, authorisation lists should be updated immediately and the keys
obtained from the individual involved.
4.40
Keys should only be issued to persons specifically authorised to withdraw them; the
number of such persons should ideally be limited to one, but no more than three for
each department, to prevent the need for lengthy lists. Authorisation to withdraw a
key should be provided by a key authorisation letter, countersigned by the Head of
the Department and bearing the printed names and specimen signatures of those
entitled to withdraw.
Security marking and asset tagging
4.41
When practicable, NHS assets should be security marked or tagged with details
including the organisation’s postcode and name. Security marking refers to making
conspicuous or inconspicuous identification on the asset that cannot be altered or
removed. Visibly marking the asset can act as a good deterrent to would-be thieves.
There are many available products on the market for marking different types of
assets. Security marking assets can also assist in their recovery in the event of theft
or loss. The use of an asset marking system will require a secure database register
which is linked to the system. Such systems should meet the requirements of the
standards on overt asset marking technologies, LPS1225 Requirements for the
LPCB Approval and Listing of Asset Marking Systems; and LPS1650 Requirements
and testing procedures for the LPCB approval and listing of ‘theft resistant’ electronic
products, which determines the efficacy of built-in security features on some
19
healthcare equipment. Loss Prevention Standards are issued by the Loss Prevention
Certification Board 7 . The full range of standards can be obtained from
www.redbooklive.com.
4.42
Asset tagging refers to attaching security tags to equipment, which uses wireless
radio frequency identification technology (RFID) to track the equipment as it moves
around the premises, or leaves a designated area. RFID tags vary in size and can be
attached to anything of value. There may be concerns about the use of RFID in
relation to certain types of medical equipment. Therefore, before considering the
implementation of asset tagging, NHS health bodies are advised to look at how
different systems operate and to consult other NHS health bodies where an asset
tagging system is already in use.
Fraud reporting
4.43
In cases involving suspected fraudlent behaviour or alleged fraud, this should be
reported either to the health body’s Local Counter Fraud Specialist, or by calling NHS
Protect’s confidential Fraud and Corruption Reporting Line on 0800 028 40 60.
7
The Loss Prevention Certification Board is part of BRE Global. It is an independent third party
approvals body offering certification of fire, security and sustainability products and services to an
international market.
20
Appendix 1
Checklist for assessing risks to NHS assets
This checklist assists with assessing the risks to an asset or particular group of assets. The
questions will assist managers and the NHS health body’s LSMS to identify particular risks
and to mitigate them. Once an analysis is undertaken of the appropriate information
including the asset’s value, criticality and vulnerability, it should be possible to determine the
level of risk it is exposed to and the appropriate level of security protection required.
Note: This list is neither prioritised nor exhaustive, and does not need to be
completed sequentially. It acts as a guide only.
1. Where the asset is stored/used
State the location and purpose of the site or building and provide any background
comments on its priority or importance. State existing physical security measures including
controls such as access control, security patrols etc.
2. Stakeholders
List all the stakeholders who have an interest in the operational security of the site or
building. Confirm whose priorities might be most important, and how any conflicting
priorities might be resolved, for example fire officer.
3. Assets to be protected
List the assets that are to be protected together with their value (human, financial,
operational).
21
4. The threat
State the perceived threat, the likely abilities of attackers, the tools they may use and the
likely methods of attack. Try to estimate the probability and expected frequency of the event
occurring. What has happened before and where?
5. Areas of concern and vulnerabilities
What are your areas of concern and vulnerabilities? (List each defined area). Where are the
assets located (site or building)? Indicate how these sites are vulnerable to the threat. Tie in
with the likely methods of attack (section 4 above).
6. Consequences of compromise
State what these are in terms of financial, operational, morale and reputational
consequences. There may be different assets with different consequences resulting from
their compromise – these should be recorded. Consider how easy it would be to replace the
assets if they were compromised.
7. Success criteria
What are your success criteria? For example the detection of all intruders, or preventing an
intruder breaching an asset, identifying an intruder or obtaining evidence for legal purposes.
22
8. Other factors
Include any constraints like budgets, legal issues, planning permission, neighbouring
facilities, staffing levels, response force and external constraints like procedures and
management controls.
9. Possible security solutions
While considering the issues under the above headings, various possible solutions may
have come to mind. These should be noted, together with any constraints. Keep an open
mind; this is still only the statement of needs, not the final solution. This section might state
which possible solutions have been discounted and why.
10. Integration and critical linkages
Identify where integration would be desirable and note which elements would need to be
integrated. Integration and critical linkages in any system can occur at different levels. At a
management level the combining of different functions at the control room can reduce the
required manning levels while simplifying an operator’s tasks.
23
Appendix 2
Policy template for the security and management of NHS assets
Document header: [Insert document reference number: xxxxx
organisation name: xxxxx]
Policy template for the security and management of NHS
assets in [insert name of organisation]
The following sections form a standard model policy template. NHS health bodies can use these
headings and contents as a guide to structure their own localised policy for the security and
management of NHS assets. The localised policy can also be used to create departmental/unit
policies and procedures, tailored to the specific needs of the department/unit.
The italicised text under each section is designed as a series of questions/prompts
to assist in developing a policy; the standard text is for general guidance.
Title:
Policy for the security and management of
NHS assets in [xxxxx] trust
Purpose:
Policy outlining the roles and responsibilities
for the security and management of NHS
assets in [xxxxx] trust
Author:
Name and title
Version number:
Version [xxxxx]
Supersedes document:
Title and version number
Cross reference with:
Associated relevant policies (e.g. security
management, risk management, SFIs, SOs)
Responsible committee / director:
Name and title
Lead officer:
Name and title
Target audience:
Staff groups that this policy applies
Date ratified:
Date document approved
Ratified by:
Name and title
Date issued:
Date policy issued
Review date:
Date policy to be reviewed
Contact details:
Person responsible for maintenance of this
policy
24
Contents
1. Introduction
2. Policy intention/aim
3. Policy scope
4. Definitions
5. Statutory responsibilities (organisations)
6. Roles and responsibilities (individuals)
7. Risk assessment
8. Security measures
9. Monitoring and auditing of policy effectiveness
10. Dissemination of this policy
11. Review of policy
12. Appendices
25
1.
Introduction
1.1
Provide detailed explanations tailored to the local needs of the organisation under
each of the following headings.
2.
Policy intention/aim
2.1
This section should explain the aims of the policy and the intended outcomes, which
at a minimum should be to secure the health body’s assets and to reduce the risk of
an asset being stolen, damaged or lost.
3.
Policy scope
3.1
This section should explain the scope of the policy, and how it will assist the
organisation in the protection of its assets and help support the delivery of NHS
Protect’s anti-crime strategy.
3.2
It should also identify the target audience of the policy and who it applies to. This
may include internal and external stakeholders.
3.3
The policy should also identify which situations it applies to, e.g. equipment loans
between departments and surgical equipment being sent off site for cleaning.
4.
Definitions
4.1
For consistency purposes, this section should explain any definitions or technical
terms used within the document which might need clarification. Not everyone reading
the document may be familiar with a particular term or have the same understanding
of its meaning. For example, a definition of ‘asset’ might be useful.
5.
Statutory responsibilities
5.1
This section should outline the responsibilities of organisations whose statutory role
has a bearing on the protection and security of NHS assets. Local policies should
incorporate existing legislation, guidance, policies or forms of good practice made
available by these organisations.
Provide detailed explanations, tailored to local needs, of the following organisations
under each of the following headings.
5.2
NHS Standing Financial Instructions
Explain that Standing Financial Instructions (SFIs) are issued in accordance with the
Financial Directions issued by the Secretary of State for Health.
Explain that SFIs shall have effect as if incorporated in the Standing Orders (SOs) of
the organisation. The SFIs refer to the financial responsibilities, policies and
procedures adopted by the organisation.
Explain that SFIs are designed to ensure that financial transactions are carried out in
accordance with the law and government policy in order to achieve probity, accuracy,
economy, efficiency and effectiveness. The SFIs identify the financial responsibilities
that apply to everyone working for the organisation.
26
Explain within the policy document that all executive and non-executive directors and
members of staff should be made aware of the existence of these documents and,
where necessary, be familiar with the detailed provisions within them. However, SFIs
do not provide detailed procedural advice and should be read in conjunction with the
organisation’s own appropriate departmental and financial policies in relation to asset
management.
5.3
NHS Protect
State that NHS Protect is a division of the NHS Business Services Authority and has
policy and operational responsibility for the management of security in the NHS.
Explain that all security incidents involving theft or criminal damage of NHS assets
should be recorded on the organisation’s reporting system and reported to NHS
Protect by the LSMS.
5.4
Health and Safety Executive (HSE)
State that the HSE enforces workplace health, safety and welfare legislation,
underpinned by the Health and Safety at Work Act 1974 and by the Management of
Health and Safety at Work Regulations 1999. Explain that there may be health,
safety or welfare implications when equipment is stolen, damaged or lost, and there
may be an impact on patient care or safety.
5.5
The Care Quality Commission (CQC)
State that the CQC was established under the Health and Social Care Act 2008 as
the independent regulator for health and adult social care in England. Explain that
the CQC has introduced a new system of registration for all health and adult social
care providers. This is designed to make sure that people receive services that meet
essential standards of quality and safety. Explain that the Health and Social Care
Act 2008 (Regulated Activities) Regulations 2010 set out these essential standards,
which providers of health and adult social care are required to meet in order to
register with CQC. Under Regulation 16 providers must ensure that “equipment is
available in sufficient quantities in order to ensure the safety of service users and
meet their assessed needs”. CQC guidance provides a set of outcomes and prompts
which will help providers ensure that they meet standards and regulations. Examples
of relevant outcomes are Outcome 11A (equipment is “stored safely and securely to
prevent theft, damage or misuse”) and Outcome 11F (medical devices are “available
when they are required for use [and] disposed of or recycled, safely and securely”).
Also explain that CQC guidance indicates in more detail what providers should be
doing to meet the requirements of the regulations. These detailed indications are not
legally binding, but if a provider decides not to follow them, they will still have to show
they have taken them into account when judging their compliance with the
regulations. These indications include measures which may impact on patients’
experience, e.g. measures relating to theft.
5.6
NHS Litigation Authority (NHSLA)
State that the NHSLA handles civil legal liability claims through a variety of
membership schemes of which most providers of NHS care are members. The
NHSLA has an active risk management programme to help raise standards and
reduce the number of incidents leading to claims.
27
Explain that the NHSLA Risk Management Standards include an assessment of the
process the organisation has in place for managing the risks associated with the
physical security of premises and assets.
Potential losses, damages and theft to NHS assets may have an impact on the
insurance premium the organisation will be expected to pay. Therefore this policy
should demonstrate that there are effective risk management arrangements in place
that meet the NHSLA’s requirements.
5.7
Medicines and Healthcare Products Regulatory Agency (MHRA)
State that the MHRA is the government agency responsible for ensuring that the
manufacture and use of medicines and medical devices meet appropriate standards
of safety, quality, performance and effectiveness. It has responsibility for ensuring
compliance with statutory obligations relating to medicines and medical devices
through inspection, and for taking enforcement action where appropriate.
Explain that the MHRA investigates adverse incidents involving medical devices and
equipment, issues safety warnings, provides advice and guidance on safety and
quality issues and acts as the UK regulator for the medical devices industry.
Include reference to MHRA guidance Managing Medical Devices DB2006(05) which
provides guidance on the resale of medical equipment.
6.
Roles and responsibilities
6.1.
This section should set out the roles and responsibilities of those individuals and
departments who play a critical role in the acquisition of NHS assets and will have
some involvement in the protection and security of assets.
6.2
Chief Executive
Explain that the Chief Executive has overall responsibility for the assets of the
organisation and for ensuring that the organisation has adequate processes in place
to protect the public investment in them. If this responsibility has been delegated to a
member of the board or board level committee, details should also be provided here.
6.3
Board of Directors
Explain the Board has a dual role: it is responsible for ensuring effective security
management systems are in place within the organisation, and also for ensuring that
the organisation complies with all its statutory functions and obligations in relation to
safety and security management, such as health and safety legislation.
Explain that the Board instructs the Director of Finance to implement the
organisation’s financial policies, ensure that detailed financial procedures and
systems are established and ensure that sufficient records are maintained to show
and explain the organisation’s transactions, in order to disclose its financial position.
6.4
Director of Finance (DoF)
Explain that the Chief Executive delegates powers to the DoF in his/her role as a first
line budget holder responsible for the Finance Directorate. In addition to these, the
28
DoF is provided with further powers to manage the approval of financial transactions
initiated by other directorates across the trust.
Explain that the DoF shall prepare, document and maintain detailed financial
procedures and systems incorporating the principles of separation of duties and
internal check to supplement these instructions.
The DoF will report annually to the Board and Council of Governors(in Foundation
Trusts) on the adequacy of internal financial control and risk management as part of
the Board’s overall responsibility to prepare a statement of internal control for
inclusion in the organisation’s annual report.
6.6
Other directors
Explain that it is the responsibility of the Security Management Director (SMD) to lead
and communicate at board level on strategies to protect and secure the assets. NonExecutive Directors (NEDs) play an important role in scrutinising these arrangements
and holding the Chief Executive and Board to account. NEDs and SMDs should also
refer to the NHS Protect publication Guidance for Security Management Directors
and Non-executive Directors for details of their full roles and responsibilities.
Explain the role of the Director(s) for Governance and Risk, Health and Safety who
are also likely to have some responsibility for assets and are likely to need to liaise
and work closely with the SMD and NED on related issues. Include how they will coordinate with the SMD and the DoF and report to the Board.
6.7
Audit Committee
6.8
Explain that, in accordance with standing orders, the Board of Directors shall
establish an Audit Committee, with clearly defined terms of reference. The Audit
Committee shall review the establishment and maintenance of an effective system of
integrated governance, risk management and internal control.
6.9
The Audit Committee should also be responsible for:
• overseeing internal and external audit services
• reviewing financial systems
• ensuring compliance with standing orders and standing financial instructions
• reviewing schedules of losses and compensations and making
recommendations to the board
• reviewing information prepared to support the Statement of Internal Control
prepared on behalf of the board and advising the board accordingly.
6.10
Local Security Management Specialist (LSMS)
Explain that the LSMS takes forward security management work locally in
accordance with national standards, reporting directly to the SMD.
Explain how the LSMS will work with key colleagues to promote security and
effectively respond to security breaches and incidents involving NHS assets,
particularly their theft or loss.
29
This section should link to the organisation’s security policy for further details on the
roles and responsibilities of the LSMS.
6.11
Medical Equipment Advisor/Department
Explain the role of the Medical Equipment Advisor/Department in coordinating the
procurement, use, maintenance, decommissioning and disposal of pooled medical
equipment in line with current legislation and guidance. Include the organisation’s
policy for how it will manage the risks and reduce vulnerabilities when medical
equipment is sent off-site for maintenance and repair.
Explain how the Medical Equipment Advisor/Department will work with the LSMS and
other staff to secure NHS assets. This section should link to the organisation’s
medical equipment policy for further details on the maintenance, decommissioning
and disposal of medical equipment.
6.12
Responsibilities of Ward Managers and Heads of Department
Explain that all managers and department heads share responsibility for ensuring
security measures and processes are adhered to in their local area. It is their
responsibility to see that the right policies, procedures and systems are in place in
their local areas and that such policies are kept under constant review.
They need to be able to carry out risk assessments and ensure that staff understand
the importance of protecting and securing NHS assets. Mention that managers and
department heads are responsible for ensuring their staff are aware of the
organisation’s policies and procedures for securing NHS assets, and for enforcement
and/or disciplinary action against staff that do not comply.
Include that managers and department heads should implement a procedure to
record details of all assets, e.g. the make, model, serial number etc of all valuable or
important assets within their department or directorate. They should also report any
loss or damage of an asset as soon as is practicable.
State that the LSMS is available to advise on methods of security management and
appropriate systems, and he/she should be kept informed of any losses, damage or
thefts.
Explain that managers and department heads should also consider security
requirements when purchasing new assets or during large projects where there is an
opportunity to consider security from the outset.
6.13
Responsibility of the employee
Explain that all employees are expected to co-operate with management to achieve
the aims, objectives and principles of any asset management systems. Staff should
be particularly aware of their own responsibilities in protecting, at all times, NHS
assets, property of patients, visitors and the organisation.
State that where specific security procedures exist, staff must abide by them at all
times. Where staff know of, or suspect, a breach in security, they must report it
immediately to their manager and should inform the LSMS.
30
6.15
Contractors and contracted staff
Explain that this policy applies to all contractors and contracted staff, who should
equally be made to understand the importance of protecting NHS assets and should
receive appropriate training in relevant security practices and procedures. They
should also have access to the policy.
7.
Risk assessments
LSMSs should provide detailed explanations tailored to the local needs of their
organisation….
7.1
Explain the organisation’s risk assessment process and how it applies to the security
of its assets. Following the risk assessment, the organisation should be in a position
to determine appropriate security measures and controls to deliver the aims of the
policy.
8.
Security measures
LSMSs should provide detailed explanations tailored to the local needs of their
organisation…
8.1
This section should highlight the main security options available to protect assets and
provide advice on how to select the most appropriate security measures, based on
the risk assessment.
9.
Monitoring and auditing of policy effectiveness
9.1
Explain that monitoring is essential to ensuring that security measures are
appropriate and robust. Arrangements might include:
• reminding everyone they have a role in protecting and securing NHS assets
and that it is their responsibility to report any theft, damage or loss immediately
• asset registers, which should be completed and kept up to date
• regular audits or inspections to measure performance against asset registers.
9.2
Where deficiencies are identified as a result of monitoring, the organisation should
explain how appropriate recommendations and action plans are developed and how
any recommendations made are to be implemented.
10.
Dissemination of this policy
10.1
This section should explain how this policy will be disseminated, who it should be
disseminated to and by what means.
11.
Review of this policy
11.1
This section should describe how this policy will be reviewed, and link to any relevant
organisational level guidelines. Detail here which committee is responsible for the
review of this policy, and how often a review should take place.
31
12.
Policy appendices
12.1
List here information on existing policies that are relevant to the organisation and to
this policy.
32
Appendix 3
Guidance on the security and management of NHS assets –
Consultation
Consultation on this document was undertaken between July and October 2011. All
NHS Local Security Management Specialists (LSMSs) and a broad range of other
NHS stakeholders were invited to participate in the consultation process. In total,
19 responses were received. This feedback proved extremely valuable in finalising
the document and its contents.
The consultation questions are included below for reference.
1.
In your opinion, does the document address the specific ‘purpose and scope’ as
set out in section 1.10?
2.
Who do you think the target audience should be for this type of document?
3.
Does chapter two, explain the stages in the ‘life cycle’ of an asset in enough
detail? If not, what else should be included?
4.
Do you have any comments on the risk assessment framework as outlined in
chapter three?
5.
Are there any other security measures you would like to see discussed or included
in chapter four?
6.
In the future, would it be helpful for NHS Protect to produce further guidance on
securing and protecting any particular NHS asset? If yes, which assets?
7.
Do you think the checklist in appendix 1 will assist NHS health bodies to conduct
or inform their own risk assessment process?
8.
Do you think the policy template provided in appendix two will assist health bodies
to develop their own local policy?
9.
What other types of materials or support on the issue of protecting and securing
NHS assets, would be helpful to NHS health bodies?
10.
Do you have any examples of good practice you would like to share with us?
11.
Would you be willing to help support our work on this subject in the future? For
example, to assist in providing case study material, be part of a work group, etc?
12.
Do you have any other comments you wish to make on this document?
33

Similar documents