Objectives, Modules, and Topics
- Objectives-After taking this course, the participants will be able to:
- Describe the core elements of a job description
- Identify core competencies for security and safety officers
- Train and coach new officers to meet established competencies, and follow organizational processes and procedures
- Explain the overall process for making good healthcare safety and security decisions
- Demonstrate situational awareness in a healthcare environment
- Apply a decision-making process by assessing incidents, and prioritizing and taking action
- Follow-up and document incidents
- Identify common roles within a healthcare organization
- Identity the types of safety and security issues that could affect each role
- Communicate clearly and effectively with team members
- Manage customer issues effectively
- Perform service recovery steps within your scope of authority
- Describe the role of security officers in a healthcare environment
- Recognize non-traditional security roles and how to address them
- Identify and describe the purpose of commonly used security technologies
- Modules
- Module 1 – Analyzing Officer Job Descriptions and Competencies
- Topics
- How to Use this Module
- Analyze Job Descriptions and Competencies
- Module 2 – Training and Coaching Security Officers
- Topics
- Foundational Training Concepts
- How to Train: Steps for Success
- Evaluate and Report Training Effectiveness
- Module 3 – Making Security and Safety Decisions
- Topics
- Overall Decision-Making Process
- Situational Awareness
- Assess the Incident
- Prioritize and Take Action
- Follow-up and Documentation
- Module 4 - Communicating Effectively Throughout the Organization
- Topics
- Organizational Awareness
- Communication Process and Principles
- Communicating with Your Team
- Communicate with Your Customers
- Module 5 - Defining and Clarifying Security’s Role within your Healthcare Organization
- Topics
- Define Security Department Scope within your Organization
- Video Surveillance
- Access Control
- Additional Security Technologies
- Technology Considerations