Download PDF version Contact company

Just as physicians recommend that their patients obtain treatment early, before a condition worsens, so is Intermountain Healthcare addressing the issue of security early, before problems occur. In addition to providing excellent outcomes for its patients, Intermountain is stepping forward to raise the bar for security systems by providing ID cards that are tied to access control systems.

Threats of terrorism and bioterrorism brought a new dimension to health care in the United States following 9/11, encouraging many health care centers to enhance their security systems and prevent unauthorized movement throughout the facilities.

Healthcare Security System

Health care workers still need freedom of access, especially in situations requiring urgency, when they have to move quickly to access medication, equipment and supplies. “When we put one more barrier in front of them, it becomes a huge dissatisfier,” said Mike Rawson, Director of Safety, Security and Environmental Health. “We want to provide ease of access but at the same time an increased level of security. It’s a balancing act.”

In the past, hospitals have always created an open and welcoming atmosphere,” he added. “As health care systems increase levels of security, they create additional inconvenience to patients, visitors and employees. In a system the size of Intermountain Healthcare, increased inconvenience can be a significant challenge to patient and employee relations.”

Intermountain Healthcare began with 15 hospitals donated by the Church of Jesus Christ of Latter-day Saints in 1975

Proximity Access Control

Intermountain Healthcare began with 15 hospitals donated by the Church of Jesus Christ of Latter-day Saints in 1975. It is an integrated system of physicians, health plans and 21 hospitals from Burley, Idaho, to St. George, Utah, with most of its facilities in the Salt Lake City area. It strives to be a model health care system – an example worthy of emulation by others – not only in clinical outcomes, but also in cost efficiencies and operations. Its access card program is part of that plan.

 “We added proximity access control in all hospitals in 2006,” said Rawson. “Before that, we used cards with a bar code for identification and payroll, along with a typical key system. Now we have proximity access control throughout the entire system, using a Kronos time and attendance system with DSX, Continental and C-CURE access control software.”

The single card now allows employees to enter authorized areas, records time and attendance, and provides visual identification for patients and visitors. Employees, licensed clinical practitioners, volunteers, students, vendors and even families of patients who experience an extended stay are issued cards with varying levels of access and security.

Fargo Printers/Encoders

With direct-to-card technology, the printhead comes in direct contact with the card, producing sharp facial images

We have used Fargo printers ever since we began printing cards,” said Rawson. “Fargo was recommended by our access control system providers.” Intermountain has 30 printers, most of which are DTC500 Direct-to-Card Printer Encoders. With direct-to-card technology, the printhead comes in direct contact with the card, producing sharp facial images and fine detail around areas such as the eyes, enhancing the ability to identify someone visually. “Some of our smaller, rural hospitals use Fargo’s smaller Persona C30 printers,” said Rawson, “as they may only make one or two cards a month.”

Rawson was responsible for selecting the printer, assisted by representatives from the Human Resources and Security departments, where the printers reside. He knew he wanted double-sided printing with a speed component suitable for a large interdisciplinary health system. He also knew the printer had to be reliable, but to anticipate any minor issues, he looked for a company with a service technician in the Salt Lake City area. Finally, he wanted high quality performance and clarity of the printed product.

Bob Barber of Interstate Business Products sold the printers to Intermountain. “Mike liked the simplicity of the DTC printers,” he said. “They are easy to clean and operate, and they run quietly.”

A bar code on the back of employee and physician cards enables them to use the access control system for time and attendance

Attendance And Access Solutions

In January 2006, Intermountain went through a rebranding, changing the spelling of its name and adopting a new logo. This required re-badging all 25,000 employees; 3,400 physicians on staff; 500 volunteers; 1,000 students (interns, residents and those on rotation); 300 vendors and others. “We accomplished all of this within five months,” said Rawson.

Employees, physicians and volunteers at Intermountain wear white horizontal badges that display their photo and name. There is one exception. Because of increased security surrounding the care of infants, clinical caregivers who transport infants wear bright pink cards to identify themselves easily from a distance. A bar code on the back of employee and physician cards enables them to use the access control system for time and attendance and to record attendance at in-service and training meetings.

Smart Identification System

Students and instructors receive vertical badges with color-coded graphic designs that vary depending on the time of year. Vendors, visitors, contractors and temporary employees receive generic vertical badges without any bar code or Intermountain logo. As an added measure of security, vendor badges expire annually.

Intermountain currently is evaluating a 3D bar code for patient identification at some future point, according to Rawson. This system would include a wrist band for the patient, enabling both patient and clinician to be identified easily and securely, and for their activity to be documented. “We also continue to discuss the value of smart cards and will add that technology when the need presents itself,” he said.

Security Identification Equipment

Intermountain has made tremendous strides in consolidating its identification cards and access control system

In the meantime, Intermountain has made tremendous strides in consolidating its identification cards and access control system. “Clinicians with responsibilities and privileges at multiple hospitals drove the need for a single card,” said Rawson. “They didn’t want to carry half a dozen cards with them.” And how did Intermountain get physicians to wear their ID cards regularly? “We tied access control to the parking lots and dining rooms,” Rawson said. “By wearing the identification card, physicians can easily access parking areas, entrances, elevators and dining areas.”

With today’s printers,” he added, “we can make an attractive ID card that individuals are proud to wear. Most people understand the need to be adequately identified to the patients they serve.” Rawson admits that the real, quantifiable benefit will be down the road, when Intermountain recovers the upfront costs of the security system, but there is no question that the decision to use ID cards for increased security has been a healthy investment.

As Barber said, “You can’t do tomorrow’s business with yesterday’s equipment.”

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Will Airport Security’s Pandemic Measures Lead To Permanent Changes?
Will Airport Security’s Pandemic Measures Lead To Permanent Changes?

Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method.  AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI.   CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021.  Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.