SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Facilities are running out of time to comply with “All Hazards” emergency planning

Facilities are running out of time to comply with “All Hazards” emergency planning
Ron Lander
Ron Lander
Contact company
Contact Ultrasafe Security Specialists
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Healthcare facilities must comply with CMS's 'All-Hazards' rule by November 15, 2017.
  • Non-compliance risks losing Medicare and Medicaid reimbursements after the deadline, affecting 17 sectors.
  • Facilities require risk assessments, emergency plans, and upgraded communication for disasters.
Related Links
  • Challenges and opportunities in analogue-to-IP video system transition in healthcare facilities
  • Physical security systems enable compliance to HIPAA and other privacy laws
  • Healthcare end users seek more integration of disparate security systems

The early October wildfires in Northern California and recent spate of hurricanes in the Southeast and Puerto Rico reinforce the fact that the healthcare community is in need of more stringent attention to organised and community-supported Emergency Management.

Regulating healthcare facilities

With the potential for catastrophes in the future, the Centers for Medicare and Medicaid Services (CMS) has been working on "All-Hazards" Emergency Preparedness for several years and published CMS-3178 - The Final Rule for Healthcare Emergency Preparedness on September 16, 2016. 

The purpose of this new regulation is to:
(1) Establish consistent emergency preparedness requirements across provider and supplier networks,
(2) Establish a more coordinated response to natural and man-made disasters, and
(3) Increase patient safety during emergencies.

This is not a sleepy regulation that gives the healthcare industry up to five years to prepare, like HIPAA (Healthcare Insurance Portability and Accountability ACT). This rule mandates that if healthcare facilities do not comply by November 15, 2017, they risk not receiving Medicare and Medicaid reimbursements in December.

Who does this affect? This applies to seventeen Medicare and Medicaid provider sectors, ranging from Ambulance Service companies to hospice providers, clinical laboratories and everything in between. 

The seventeen disciplines

  1. Hospitals
  2. Religious Nonmedical Health Care Institutions (RNHCIs)
  3. Ambulatory Surgical Centers (ASCs)
  4. Hospices
  5. Psychiatric Residential Treatment Facilities (PRTFs)
  6. All-Inclusive Care for the Elderly (PACE)
  7. Transplant Centres
  8. Long-Term Care (LTC) Facilities
  9. Intermediate Care Facilities for Individuals with Intellectual Disabilities (ICF/IID)
  10. Home Health Agencies (HHAs)
  11. Comprehensive Outpatient Rehabilitation Facilities (CORFs)
  12. Critical Access Hospitals (CAHs)
  13. Clinics, Rehabilitation Agencies, and Public Health Agencies as Providers of Outpatient Physical Therapy and Speech-Language Pathology Services
  14. Community Mental Health Centers (CMHCs)
  15. Organ Procurement Organizations (OPOs)
  16. Rural Health Clinics (RHCs) and Federally Qualified Health Centers (FQHCs)
  17. End-Stage Renal Disease (ESRD) Facilities
Demand for hardware and software from security integrators
Security Integrators should prepare for demand for hardware and software to support the theme of this regulation

Beyond the techno jargon and acronyms, the goals of the Rule recognise that there are systemic gaps
that must be closed by establishing consistency and encouraging coordination across the Emergency
Preparedness sector of the United states and its possessions. For example, “The Rehabilitation Center” in Hollywood Hills, Florida that had a portable generator and window air conditioning units because of the extreme heat, causing fourteen deaths, probably would have avoided that tragedy had there been better planning and training for a long-term power failure.

“You can’t just back up a generator to a nursing home and plug it in,” said Bob Asztalos, a Florida lobbyist at a recent Florida state hearing. Ironically, this facility was “across the street” from a major hospital and some pre-planning and installation of an “emergency” generator connection with the hospital’s power plant could also have helped immensely. There were several other factors to this tragedy-refer to this website for a CBSN video about the facility.

Las Vegas shooting

The Oct. 1 mass shooting in Las Vegas where over twenty area hospitals were dealing with victims further reinforces the need for better “community-wide” support and communications.

Further, there are four requirements that facilities must fulfill complete before the deadline:

  • Risk Assessment and Planning Document
    Each individual facility must (internally or externally) perform a Risk Assessment to identify the areas that must be dealt-with to conform with the Final Rule.

  • Policies and Procedures
    Based on the Risk Assessment, develop an emergency plan using an all-hazards approach focusing on capabilities and capabilities that are critical for a full spectrum of emergencies, or disaster specific to the respective location(s).
  • Communications Plan
    Develop and maintain a communications plan to ensure that Patient care must be well coordinated within the facility, across healthcare providers and with State and Local public health departments and emergency systems

  • Training and Testing Plan
    Develop and maintain training and testing programs, including initial and annual re-training, conducting drills and exercises (full-participation and tabletop) in an actual incident that tests the plan.
Hospital waiting room
The Rule specifically aims at smaller facilities such as Eldercare Homes and Laboratories that are more focused on patient service

Hardware and software demand

What does this mean to the healthcare security and support community? While this rule does not apply specifically to healthcare security and safety departments, consultants who have experience in healthcare risk, vulnerability and threat assessments are best positioned to provide the necessary assessments in a timely manner.

Security Integrators and other support vendors should also be ready for a demand for the following hardware and software to support the mandates of this regulation:

  1. Intelligent Access Control
  2. Visitor Management
  3. Mass Evacuation Alert Programs and Systems
  4. More extensive use of video surveillance so management can quickly assess an incident
  5. Interoperability appliances that community on public service networks
  6. Backup systems for all electronic functions from the Network Architecture to the simplest of healthcare support tools
  7. Electrical Upgrades
  8. Provision of Fresh Water and disposal of Sewage capabilities when the facility infrastructure fails
  9. Additional HVAC support through the facility’s backup systems
  10. Vendors for Fuel and other types of off-site support
  11. Suppliers of day-to-day supplies and medicine
  12. Communications support in the event of landline and cell phone failures

What should the healthcare community do?

What does this mean to the healthcare community? This Rule is not intended to focus only on large and medium-sized hospitals. It specifically aims at smaller facilities such as Eldercare Homes and Laboratories that are more focused on patient service rather than preparing the facility for a disaster.

Download the entire rule and resource information from the ASPR-TRACIE website. ASPR-TRCIE has been a leader in providing for those desiring additional support in this and other areas of healthcare emergency preparedness. While this rule focuses on Emergency Preparedness, it obviously touches on Business Continuity, Facility Management, Community Relations, Human Resources and other disciplines in the healthcare community. Make sure the C-Suite is aware of this rule and emphasize the timeliness.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Campus security systems
  • Hospital security
  • Public sector security
  • Security management
  • Security policy
  • Security camera systems
  • Security access systems
  • Security service
  • Visitor management systems
  • Security Assessments
  • Video surveillance
  • Related links
  • Visitor Management tool Access control software
  • Articles by Ron Lander
  • Related categories
  • CCTV cameras
  • CCTV software
  • Access control systems & kits
  • Access control software
  • IP cameras
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Expert commentary
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec