CHPA 5 Exam 103 Questions with Verified Answers
Gloves - CORRECT ANSWER In healthcare, the most common type of PPE
Factors when choosing gloves,
... [Show More] include: - CORRECT ANSWER *Some healthcare workers have latex allergies
*Powdered gloves create a source of airborne allergens
*Non-powdered gloves, gloves with a low latex level or non-latex gloves should be used
Designed to incapacitate a person from a safe distance while reducing serious injuries or death - CORRECT ANSWER Tasers
A disadvantage of chemical agents. - CORRECT ANSWER Effectiveness of a rapid response is limited to the need to have direct exposure to the eyes
Limitations of chemical agents: - CORRECT ANSWER No chemical agent will be effective in some cases:
People under the influence of alcohol/drugs, emotionally disturbed or combative people may have a sensory reduction in pain
This document brings together the policies, standards and general procedures... - CORRECT ANSWER The security operations manual
Identify five types of training: - CORRECT ANSWER *New officer training
*IAHSS progressive certification
*Specialized program training
*Elective training
*Security leadership development activities
The security operations manual typically includes: - CORRECT ANSWER *Purpose of the healthcare organization
*Purpose of the security program
*Security records and reports
*General security information
Use of Force Policy - CORRECT ANSWER A use of force policy should be developed in every healthcare facility and should include the identification of both clinical and non-clinical situations
** IAHSS has a guideline on use of force**
Why should you avoid providing officers with needless equipment? - CORRECT ANSWER Providing officers with needless items increases the training time and program cost.
What is the purpose of the Security Operations Manual? - CORRECT ANSWER ** The security operations manual brings together the policies, standards and general procedures
** It is intended to provide information to officers to effectively perform their job
Constraints when using handcuffs - CORRECT ANSWER **CMS is very specific about the use of handcuffs in the patient restraint process
**Handcuffs should not be used in the restraint of patients unless an arrest is going to be made
Percentage of armed officers in healthcare... - CORRECT ANSWER Today, 12% of United States healthcare security officers are armed (GE Survey, 2008)
What happens if you fail to provide uniforms to security officers? - CORRECT ANSWER By not providing officers with a uniform, a mixed message is created about the importance of security at the facility.
What factors should be considered when deciding to arm security officers? - CORRECT ANSWER Factors for deciding to arm security officers:
Personal safety
Vulnerability
Liability
Deterrent value
Environmental profile
Quality of personnel
Three primary skills for a successful officer: - CORRECT ANSWER Excellent communication
Aptitude to learn
Customer service attitude
What is the main criteria when selecting a uniform style? - CORRECT ANSWER The main criteria of what style of uniform worn is driven from the type of healthcare organization, customer service and administrative preference
What are the secrets to officer retention? - CORRECT ANSWER *Retention begins by creating a culture of continuous learning and opportunities for career advancement
*The challenge of protecting healthcare environments is a great retention motivator
What is the relationship between turnover, motivation and promotional potential? - CORRECT ANSWER There is a direct relationship between turnover and job satisfaction with the availability of promotional opportunities
What is the trend in arming security officers? - CORRECT ANSWER In recent years the use of personnel in healthcare carrying firearms has declined.
*Supervisors may be better trained and more capable of handling the weapons
*This approach may reduce the exposure of the weapon - CORRECT ANSWER Two reasons for limiting arms to supervisors.
Two key factors to remember when managing a firearms program. - CORRECT ANSWER 1) A clear and concise firearm policy is mandatory and must be understood by all officers
2) For all officers carrying a firearm, an affidavit should be completed describing policy, training and liability
Disadvantage of powdered gloves... - CORRECT ANSWER Powdered gloves create a source of airborne allergens
How do Tasers work? - CORRECT ANSWER Do not rely on pain compliance, they affect the sensory and motor function of the central nervous system
Describe the elements of a good OJT program: - CORRECT ANSWER *Many on the job training programs fail due to a lack of a formulated structure
*A checklist should be used to document training
*The signed checklist becomes part of the officers' training record
*Pre-service training should be validated with competency testing
How is IAHSS recertification handled? - CORRECT ANSWER *Certification is valid for three years
*Recertification can occur at their current level or progress to the next
What does IAHSS training focus on? - CORRECT ANSWER The program centers on the understanding of the healthcare environment and its relationship to security
Why is leadership development important? - CORRECT ANSWER *Success of every healthcare protection program is achieved by the people in the security leadership roles
*People in leadership roles must personally build and enhance their security knowledge and ability to lead
Why use Critical Task Focused Training? - CORRECT ANSWER *Training to a time period may not be a good indicator of an officer's ability to perform
*Demonstrated competency is a better indicator
Four basic tasks of patrol officers include, - CORRECT ANSWER Response to critical incidents, inspection services, routine preventive patrol and response to provide courtesy or routine service
Describe the advantages of bike patrols: - CORRECT ANSWER *Focuses on being a visible deterrent to crime
*Approachable source of assistance and information
*Patrol large areas more frequently in shorter periods of time
*Allows officers to be more interactive with the community served
*Greater maneuverability in small areas
*Added element of surprise to counter crime
*Officers should be certified and submit to specific performance evaluation
*Should wear a uniform that can stand up to mobility requirements and include a helmet
Points to remember when organizing the patrol officer's key ring: - CORRECT ANSWER *Carry certain keys to effectively carry out their responsibilities
*Not necessary to carry keys to every locked door
*Each locked area of the facility must be evaluated and a plan developed regarding access requirements
*Eliminate need to carry a key is to make the key available at a location controlled by another department
These are two basic methods of deployment: - CORRECT ANSWER Sector (zone) patrol and unrestricted patrol.
How well the security department carries out its assigned responsibilities will depend in large part: - CORRECT ANSWER on planning, controlling, evaluation, and modifying personnel in the field
Describe a modified fixed post. - CORRECT ANSWER ** Is left unoccupied at times to conduct patrol rounds or to answer calls for service
** Random rotation to two or more fixed post locations
** Divide their time between the three areas in a non-patterned schedule
Security operations are primarily concerned with... - CORRECT ANSWER security force deployment
A key element of an effective protection program is: - CORRECT ANSWER the proper deployment of personnel
In addition to supervisory checks, what secondary tools are available for patrol verification? - CORRECT ANSWER *Mechanical watch clock is one method but checking the clock can become the officers' primary objective
*Electronic tour reporting systems can read bar codes or magnetic strips
*Adaptation of electronic access control system
This the "backbone" of any successful deterrent program. - CORRECT ANSWER effective prevention patrol
Why are "first rounds" so important for the patrol officer? - CORRECT ANSWER *First patrol is extremely important, provides a basis for comparing all subsequent patrol activity
*Patrol checks on second and subsequent rounds are geared to observe any changes compared to the first patrol
Rotating patrols and changing assignments is recommended because: - CORRECT ANSWER *Every officer patrols with a unique point of view, take advantage by frequently rotating personnel and changing the assigned patrols
*This provides the best possible patrol coverage and avoid security officer boredom
Describe some of the potential problems, or challenges one might face with patrol officers. - CORRECT ANSWER *excessive socialization and talking too much
*discussing confidential security information with non-department personnel
*keeping officers separate when more than one is on duty
*reading non-work related material while on post
Discuss issues regarding shift rotation: - CORRECT ANSWER *Security officers must be knowledgeable about the security duties and the general activities of every shift to provide optimum protection services
*Officers who are rotated to new shift assignments often discover security deficiencies or initiate improvements not perceived by their predecessors
*Rotation plan exposes officers to more in-depth supervision because supervisors have different points of view and different method of leadership
*Supervisors are stimulated by having new security officers
What is the biggest argument against rotating shifts? - CORRECT ANSWER Not get to know who belongs and who does not belong in the facility
How often should officers be rotated? - CORRECT ANSWER No established timeframe, a cycle of six months to one year works wel.l
Background service check can include: - CORRECT ANSWER employment verifications, criminal histories, education, credentialing, references, credit reports, motor vehicle reports and date of birth statements
What role does the ID badge play in the protection program? - CORRECT ANSWER *Function as a basic element of the access control system
*Electronic time-keeping function
*Compliance with TJC standards
How many ID badges will you need? - CORRECT ANSWER The number of badges required annually is generally at least two-and-a half times the number of actual authorized positions
What factors influence visitor policies? - CORRECT ANSWER Many factors affect visitor control, including the philosophy of the administration
Elopement is defined as: - CORRECT ANSWER "A patient that is aware that he/she is not permitted to leave, but does so with intent."
Security officers should always attempt to obtain.... - CORRECT ANSWER ...verbal consent before conducting a search
What are two most important factors relative to security involvement in the missing patient incident? - CORRECT ANSWER timeliness and thoroughness of the search
Where will you encounter combative patients? - CORRECT ANSWER Emergency
Intensive Care
Mental Health
General Nursing
Medical Clinics
This program is used to manage cognitively impaired patients. - CORRECT ANSWER The Blue Shirt Program
An effective program for managing wandering patients would include: - CORRECT ANSWER proper facility design and physical security safeguards, good control policies and procedures and ongoing staff training on the management of the wandering patient
Provide an example of information you can release without a warrant or subpoena... - CORRECT ANSWER The patient's name, address, telephone number and birth date can be released without a search warrant or subpoena
The most common problem in any employee badge identification system is: - CORRECT ANSWER obtaining compliance of displaying the badge...
The name on the badge should be readable... - CORRECT ANSWER ..from at least 2 or 3 feet
Discuss package inspections... - CORRECT ANSWER *The primary concern is for egress, however ingress is also an issue relative to contraband entering the facility
*Effective control requires the compliance and cooperation of all staff as well as the control of various facility entrances and exits
Describe elements of an employee locker program: - CORRECT ANSWER *Two supervisory staff members, one from security and one from a relevant department should conduct the inspections per policy
*Personal locks should not be permitted if facility provides locks
*If staff must provide their own, they should furnish duplicate key to management
Why is an EAP important? - CORRECT ANSWER *A direct relationship exists between security and EAP
*An in-depth EAP effort is a way to prevent crime and misconduct among staff
Key components of employee involvement in the security program include: - CORRECT ANSWER educating...stimulating...motivating
What program copies "Neighborhood Watch?" - CORRECT ANSWER *The "Neighborhood Watch" concept
*This concept includes observing, reporting and dealing with suspicious activities
"Hospital Watch" programs can be as creative and practical as staff ingenuity
What is the primary safeguard against loss of staff property? - CORRECT ANSWER *Staff lockers.
*Usually evolves from a lack of proper storage facilities, carelessness, misuse, or failure to use the facilities provided
Crime Prevention is considered a pattern of : - CORRECT ANSWER attitudes
behaviors
This can be can be a gateway for facilitating and educating new employees: - CORRECT ANSWER New employee orientation
Describe the crime triangle: - CORRECT ANSWER Desire
Ability
Opportunity
Investigative activity includes: - CORRECT ANSWER *gathering and evaluating facts
*evidence
*organizational rule violations
*applicant backgrounds
*harassment and discrimination allegations
*liability claims
Investigative results can lead to: - CORRECT ANSWER recommendations for crime prevention, policy and procedural changes
What are the greatest opportunities to reduce crime in the hospital? - CORRECT ANSWER Through employee awareness
TJC standards require measurements to identify: - CORRECT ANSWER ...security performance and improvements
Why do we have physical security safeguards? - CORRECT ANSWER -Designed to protect people
Mitigate unauthorized access to:
equipment
facilities
materials
Documents
-Protect against: espionage, sabotage, damage, theft, loss
A basic principle of security is: - CORRECT ANSWER it's not a standalone process should integrate with physical security safeguards, security personnel, blended with psychological aspects, i.e. signage (restricted area, emergency exit, etc.)
What are the two levels of investigation? - CORRECT ANSWER Preliminary or initial investigation-conducted by field security responding to scene
Follow-up-may involve supervisor review, intent is to gain additional information, may be handled by same officer or specialized staff
Healthcare security is often referred to: - CORRECT ANSWER as a system of perimeters. Each succeeding perimeter is closer to the most critical areas of operation
Departments that may require investigative support... - CORRECT ANSWER Risk Management
Security
HR
Legal / Compliance
Describe the training process for security sensitive areas. - CORRECT ANSWER *Initial training for new employees about their roles and critical response
*Periodically conduct drills to test critical response plan with corrective documentation
*Annual retraining for all employees
What is meant by "security layering?" - CORRECT ANSWER Using several different security safeguards to achieve the desired level of protection, i.e. video surveillance, fencing, signage, emergency communication devices, lighting and security patrol
Section EC 1.2 of TJC compliance manual requires that hospitals have: - CORRECT ANSWER "have a plan to control ingress and egress from each defined security sensitive area"
Workplace violence includes: - CORRECT ANSWER Assaults
Stabbings
Suicides
Shootings
Rape
Attempted suicides
Threats or obscene phone calls
Intimidation
Harassment of any nature
Being followed, sworn at, or shouted at
Psychological traumas
A firm policy should be established that outlines: - CORRECT ANSWER the authorized disposition of unneeded property through the materials management department
POWER principle is: - CORRECT ANSWER Prepare for your patient
Own your work environment
Work within your training
Expect the unexpected
Remember your resources
Reasons why Materials Management is an area of special concern include: - CORRECT ANSWER Purchasing and Receiving
Storage
Equipment accountability and marking
Distribution
Disposing of property
Why might food service be an area of special interest? - CORRECT ANSWER *The process of purchasing, storing, and preparing food products in such large volumes presents a wide array of opportunities for theft and misuse
*The implementation of a strict access control plan is absolutely necessary
Design of parking accommodations should include: - CORRECT ANSWER Handicap parking (required by law)
Emergency services (transporters)
Ambulatory patients with impaired mobility
Outpatients
Clinics
Deliveries
Visitors
Staff
Students
SSA have two categories. What are they? - CORRECT ANSWER 1) Vulnerability to persons, i.e., infants, mental health, ED care, ICU care, and remote parking facilities
2) Vulnerability to properties, i.e., pharmacy, medical records, and research facilities
Off-Campus locations should be managed... - CORRECT ANSWER *as part of the main facility security program in all respects, with the exception of critical incident response
*Communications, all incident reports and physical security should be handled as if the off-campus facility were one unit with the main facility
Security tends to reference violence as any act of: - CORRECT ANSWER physical violence
threats of physical violence
harassment
intimidation
other threatening or behavior occurring at the work site
Discuss family-member abductions: - CORRECT ANSWER While nonfamily infant abductions are thought to be the greatest risks, a more common concern is the abduction of an infant or child by a family member...
Video surveillance has two basic security uses: - CORRECT ANSWER 1. access control
2. general surveillance
Nurses and healthcare workers suffer violent assaults at a rate ____ times higher than most other industries. - CORRECT ANSWER 12
Most common surveillance in healthcare is: - CORRECT ANSWER general video surveillance
This publication covers the latest guidance on child abductions... - CORRECT ANSWER Most current National Center for Missing and Exploited Children (NCMEC) guidelines titled...For Healthcare Professionals Guidelines on the Prevention of and Response to Infant Abductions
ED security training should be accomplished using a: - CORRECT ANSWER multidisciplinary approach
Afternoon shift employees
Late night shift employees - CORRECT ANSWER Two types of parkers
What types of parking demands must you plan for? - CORRECT ANSWER Handicap parking (required by law)
Emergency services (transporters)
Ambulatory patients with impaired mobility
Outpatients
Clinics
Deliveries
Visitors
Staff
Students
How is security implemented at off-campus locations? - CORRECT ANSWER Planning and implementing the security program would be a collaboration of efforts by the senior manager and the designated administrator
What is the standard or goal for off-campus security programs? - CORRECT ANSWER The goal should be that each facility is subject to standard security operating procedures and standardized physical security, equipment, monitoring, and maintenance, with allowances for special needs and circumstance unique to the facility.
For cashiers and business office staff, what is the greatest risk? - CORRECT ANSWER The greatest risk in performing these functions is the employees themselves
Security elements that should be standardized at off-campus locations include: - CORRECT ANSWER Access control
Video surveillance/alarms
Security officer coverage
Vehicle security patrols
Security signage
Night lighting
Security and Safety Incident Report
Under the Privacy Act of 1974, HCF were prohibited from disclosing information contained in a medical record, except under these conditions: - CORRECT ANSWER *Organization had patient's consent to release information
*Organization was served with a subpoena or court order
*Public health supersedes the patient's rights, such in cases involving infectious disease
*Organization is required by law to report the information to the public agency
When assessing the security needs of the ED, elements to consider include: - CORRECT ANSWER Annual volume
Trauma level designations
Types of patients
Specialized services
History
Area crime rate
Layout and design of the ED
What is the purpose of a security department's record system? - CORRECT ANSWER *a memory system
*permit the exchange of information
*direct operational procedures
*fulfill various administrative needs
*assist in the verification of security activities and planning process [Show Less]