Selecteer een pagina

Protocols & procedures

Checklist

Protocols & procedures

V

Isolation of suspected cases

Establish isolation protocols and deliver solutions to separate suspected cases from the other patients, i.e. placement in different waiting rooms, use of different toilets, restricted areas for water and food supplies.

V

Remote support of access control

Develop procedures for real-time and remote support of access control including monitoring, reporting, and data analytics.

V

Repair, maintenance and replacement

Develop procedures and service level agreements to ensure that access control to restricted areas is in perfect working order and can be quickly replaced or repaired if needed.

V

Emergency lock-down

Establish a protocol for emergency lock-down of rooms, departments, and buildings.

V

Monitoring, tracking and logging patient and visitors movements

Establish protocol for visiting of patients and develop systems for training, managing and monitoring visitors, i.e. visitor including limits to patient movement around the facility, tracking and logging.

V

Privacy

Establish privacy protocols and solutions for (temporary) recording and use of access control data.

V

Access control for third party parties

Develop a protocol and authorization profiles for service providers i.e. for the outsourcing of waste management and cleaning.

V

Remote and on-site support of access control

Establish procedures for remote and on-site support of access control including real-time authorizations, (alarm) monitoring, reporting, and data analytics.

V

Authentication profiles

Prepare authentication profiles per role/job that can be applied to access control in real-time.

Keep me updated

You will receive occasional checklist updates. No marketing or newsletters.

Follow our blog

Stay up to date with our insights and news.