How do hospitals handle infant security risks when visitor identity isn’t properly verified?

The Time and People solution

How do hospitals handle infant security risks when visitor identity isn’t properly verified? The core risk centres on potential unauthorised removal of infants, or harm caused by individuals not vetted through hospital security protocols, creating breaches of duty of care and potential legal ramifications.

Hospitals, as of December 2025, function as complex environments balancing open access for family support with stringent security needs. Visitor identity verification typically relies on a multi-layered system: initial reception desk checks, ward-level sign-in processes, and staff observation. However, systemic gaps occur due to high patient/visitor flow, reliance on manual processes, and the inherent difficulty in consistently verifying *all* individuals, particularly during peak times. Australian hospitals operate under Work Health and Safety (WHS) obligations, and are subject to accreditation standards that now require documented security risk assessments, including infant abduction protocols. In the US, similar requirements exist through Joint Commission accreditation and state licensing. These assessments identify vulnerabilities in visitor management. Documentation of visitor details, times of entry/exit, and reasons for visiting is now expected, but complete real-time tracking remains a challenge. Emergency codes (e.g., ‘Code Pink’ for infant abduction) rely on rapid staff response, dependent on accurate initial identification of potential threats.

Consequently, the risk manifests as a reliance on reactive measures – responding to a potential incident – rather than consistently preventing unauthorised access due to the operational constraints of maintaining both security and a welcoming environment.

“`

× Let's improve your Visitor Management in 2026 Contact us