Security Department Policy Hospitals Have Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

Many states, such as Virginia, are training private security officers in order to ensure smooth cooperation and coordination between security companies without police powers and the police and sheriff's departments. In Washington D.C., the municipal police department requires private security officers to be licensed as "special police" officers in order to legally search or arrest people. Cooperation can reach significant proportions, as in the case of the Minneapolis Police Department's "SafeZone" program, which place private security officers downtown who now outnumber Minneapolis Police Department officers there 13 to 1.

4. Industries and organizations that use special and/or commissioned officers and for what purposes

a. There is a truly broad range of industries and organizations which use special police officers. These organizations tend to have significant financial resources, large premises, and sensitive security needs which they believe cannot be met by the existing public police force. These often involve the need to have an officer permanently standing guard on the premises who have the authority to investigate potential criminal situations and detain individuals.

b. The reasons for unmet security needs often arise because of limitations in resources and manpower or limitations created by the particular policing strategy of the private organization. For example, department stores hire private security officers for loss prevention purposes because most police departments will not commit their limited manpower to stand guard at a store. Private residential communities often hire private security officers with police power because of the increased risk of property crime faced by rich private communities.

c. Even local governments themselves hire private security forces to assist the public police department in patrolling broader areas. This is particularly true of those local governments which lack the resources to increase their police forces. These government often receive help in funding the hiring of these private security forces from interested private parties themselves. For example, Target and other Minneapolis companies paid for a wireless video camera system in Downtown Minneapolis which private security forces share with the Minneapolis Police Department.

5. Miranda Rights

a. The 4th Amendment requires arresting agents to read an arrested individual the individual's Constitutional Rights within a reasonable period after formally arresting the individual. These are the right to remain silent, the right to an attorney, and a caveat that anything the arrestee says can be used against him in a court of law. These rights are collectively known as Miranda rights after the Supreme Court case Miranda v. Arizona.

b. Among hospital staff, the only persons who would have to read Miranda rights to an arrestee would be a private security officer with valid police powers who is arresting the individual pursuant to the powers and responsibilities vested in him by the appropriate authority. Also, the private security officer should also be exercising his powers in pursuance to the job duties and directions provided to the officer by the employer, both in employment contract as well as through less formal communications.

6. Detention of individuals by private security officers and the circumstances in which individuals are detained

7. Generally, individuals in custody are given court procedural justice protections by the Sixth Amendment in addition to the search and seizure protections they enjoy under the 4th and 5th Amendments. The Sixth Amendment protections guarantee a right to representation by an attorney and the right to a speedy trial. Search and seizure law protects individuals from undue coercion and harassment of an arrested individual by an officer after the individual has entered the custody of the officer. These protections strengthen if an individual exercises the Miranda Right to remain silent and the right to an attorney.

8. Evidentiary issues in the investigation of crime and arrest of individuals.

a. The exclusionary rule prohibits the government from profiting from its own misconduct in violating the 4th, 5th 6th, Amendments. Illegally obtained evidence cannot be used to prove the guilt of the defendant. Furthermore, the "Fruit of the Posionous Tree" doctrine extends the exclusionary rule to all evidence derived from the exploitation of the illegally obtained evidence. Illegally obtained evidence of the fruits thereof, however, may be admitted for the limited use of impeaching the defendant's testimony in a criminal trial.

Bibliography

http://www.seattlepi.com/local/430256_harborview.html

U.S. Constitution

Amy Goldstein, Washington Post, the Private Arm of the Law…[continue]

Cite This Term Paper:

"Security Department Policy Hospitals Have" (2011, March 31) Retrieved December 7, 2016, from http://www.paperdue.com/essay/security-department-policy-hospitals-have-10834

"Security Department Policy Hospitals Have" 31 March 2011. Web.7 December. 2016. <http://www.paperdue.com/essay/security-department-policy-hospitals-have-10834>

"Security Department Policy Hospitals Have", 31 March 2011, Accessed.7 December. 2016, http://www.paperdue.com/essay/security-department-policy-hospitals-have-10834

Other Documents Pertaining To This Topic

  • Addressing the Security of Pre Hospital Care Providers

    EMS and Paramedics Carry Guns on the Job Emergency Medical Services (EMS) are a form of emergency service, whose main objective is to provide acute medical care, transportation to healthcare organizations, including special medical transport to patients of attacks due to act of terror and others of the same kind. In addition, the emergency medical services are also locally referred to as paramedic service. Other countries across the globe refer them

  • Securities Regulation of Nonprofit Organizations

    Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

  • Security Breach Case Scenario 1 Security Breach

    Security Breach Case Scenario 1: Security Breach Hospitals have the opportunity and responsibility to integrate sound policies and procedures in relation to the protection of the confidential client information (Rodwin, 2010). St. John's Hospital in no different to this notion has the organization seeks to enhance the security and confidentiality of the information of its clients. The organization is a role model to other institutions within the geographical area on the essential

  • Security Plan the Maryland Public

    This is sensitive information that should be securely stored. The records contain confidential information that could be used in identity theft. The records should be securely stored either in soft copy or hard copy. Only authorized personnel should have access to these records. Audit trails should be installed to keep track of the personnel who access the records. The authorized personnel should be analyzed and background checks conducted. Strict

  • Security Privacy in Health Care the Protection

    Security Privacy In health care, the protection of confidential patient information is an important key in to addressing critical issues and safeguarding the privacy of the individual. To provide more guidance are federal guidelines such as: the Health Care Insurance Affordability and Accountability Act (HIPPA). On the surface, all facilities are supposed to have procedures in place for discarding these kinds of materials. ("Summary of HIPPA Privacy Rule," 2102) In the case

  • Security of Health Care Records

    " (Harman, Flite, and Bond, 2012) the key to the preservation of confidentiality is "making sure that only authorized individuals have access to that information. The process of controlling access -- limiting who can see what -- begins with authorizing users." (Harman, Flite, and Bond, 2012) Employers are held accountable under the HIPAA Privacy and Security Rules for their employee's actions. The federal agency that holds responsibility for the development

  • Department of Health and Human

    In 2002, "President Bush signed into law the Public Health Security and Bioterrorism Preparedness and Response Act of 2002, which, among other things, eliminated the need to convene an advisory committee to amend the list of diseases" listed as quarantineable (Misrahi, Foster, Shaw, & Cetron 2004). This law became significant during the SARS scare. Before 2002 "the list of federal quarantinable diseases in the United States had not been revised


Read Full Term Paper
Copyright 2016 . All Rights Reserved