Among the consequences responsive to the present pandemic is the frustration of the public at large which, in part stems from the restrictions, reactive to the risk of contagion. This frustration is, in part, is driven by the necessity for restrictive behavior. Additionally, there seems to be an emerging uptick in the propensity to bring […]
SMSI Inc. is a security consulting firm. SMSI provides two broad based services. First, we provide comprehensive security assessments, primarily to those industries that serve the public, such as hospitals, shopping malls and the lodging industry, to name just a few. Additionally, we have been retained as court certified security experts on over 230 occasions. […]
At any point in time, are you aware who is in your hospital, and where they are? This question is especially applicable to non-patients. This scenario is a factor in most hospital premises liability lawsuits, with intentional torts being a close second. It is important to keep in mind that security is a proactive discipline. […]
Security litigations include both the sins of omission, as well as the sins of commission. The adequacy and efficacy of security programs are defined situationally, on a case by case basis. Defining a reasonable standard of care is also situational, to be determined by the ambient threat environment. Because the ambient threat environment is dynamic […]
When was the last time your hospital commissioned an objective, comprehensive security review? Was the security review considered reactive or proactive? Security Management Services International, Inc. is a security consulting firm that focuses on the unique security needs of hospitals. We have found that most security reviews come in the wake of an adverse event. […]
Are you in charge of security for a healthcare facility? SMSI has developed a security awareness training program for hospitals that fulfills the motto: If you see something, do something. In less than two hours, we will empower employees, from housekeepers to RNs, with the basic tools of threat recognition at the incipient phase, the […]