AS 4485.1:2021 pdf free download - Security for healthcare facilities Part 1: General requirements

AS 4485.1:2021 pdf free download – Security for healthcare facilities Part 1: General requirements

Posted by

AS 4485.1:2021 pdf free download – Security for healthcare facilities Part 1: General requirements.
(a) patients, workers and others required to attend such facilities;
(b) drugs and other controlled substances;
(c) information; and
(d) property owned or controlled by the facility, and the property of patients, workers and others at the facility.
Together. AS 4485.1 and AS 4485.2 provide requirements and guidance for the development and implementation of policy, principles and procedures for all public and private hospitals, facilities in remote locations, primary care facilities, community and residential aged-care facilities, and other locations where healthcare is delivered.
1.2 ApplIcation
This Standard is primarily for use by people who have direct responsibility for developing and managing security arrangements at a healthcare facility. It is designed to he used as a framework for developing security policy, systems and practices unique to individual facilities.
Security controls should not be applied indiscriminately. They should harmonize with other operational requirements of the facility and, in some cases, be tailored to specific areas within the facility.
Security procedures shall not impinge on the quality or effectiveness of patient care services.
1.3 Normative references
The following documents are referred to in the text in such a way that some or all of their content constitutes requirements of this document.
NOTE Documents for Informative purpnse are listed In the Bibliography.
AS 4811, Employment screening
AS 5182, Vendor credentialing for healthcare facilities
AS/NZS 1158.3.1, Lighting for roads and public spaces, Part 3.1: Pedestrian area (Category P) lighting— Performance and design requirements
AS/NZS 1680.2.1, Interior and workplace lighting. Part 2.1: Specfic applications — Circulation spaces and
of her general areas
AS/NZS 1680.2.5, Interior and workplace lighting, Part 2.5: Hospital and medical tasks
AS/NZS 1680.3. Interior and workplace lighting. Part 3: Measurement, calculation and presentation of photometric data
AS/NZS 1680.4, Interior and workplace lighting. Port 4: Maintenance of electric lighting systems
3.5 Performance of risk assessments
Security risk assessments shall be conducted by qualified and experienced personnel in consultation with relevant workers and other stakeholders as part of —
(a) the decommissioning process to secure vacated premises; and
(b) the commissioning and planning processes for new and redeveloped facilities.
Security risk assessments shall be documented and plans developed.
Risk assessments and control plans shall be retained by the facility for a period of at least seven years.
NOTE There may be additional regulatory requirements affecting how long risk assessment and control plan
diicurnensatlon is to be retained.
3.6 Outcomes of risk assessment
Each risk assessment shall result in a plan to manage identified risks.
Policy, procedures, controls and training shall be reviewed, revised and updated In accordance with the security risk management plan.
The facility shall be able to produce evidence that the recommendations olthe security risk management plan have heen implemented. Each security risk management plan shall address the following:
(a) Identification of priority areas.
(b) Security governance.
(c) Security overview.
(d) Physical security.
(e) Security technology.
(f) Administrative and procedural security.
(g) Worker, patient and visitor safety.
(h) Security personnel.
(I) Information security management (in accordance with AS lSO/IEC 27001).
(0 Strategies to address vulnerahilities.
(k) Training and development.
(I) Traffic and vehicle management.
m) Security activities.
(n) Incident management and response.
(o) Personal protective equipment.
(p) Emergency preparedness and business continuity.
NOTE Refer to AS 4485.2 for further information on the security risk management plan.

Leave a Reply

Your email address will not be published. Required fields are marked *