1 / 14

Security of radioactive sources in the UMC Utrecht

Security of radioactive sources in the UMC Utrecht. Carolien Leijen Radiation Protection Supervisor. Content. UMC Utrecht Enhancing security Sources Critical processes Threats Security Vulnerability Improvements. UMC Utrecht. 1 042 clinical beds 31 000 admissions

kateb
Download Presentation

Security of radioactive sources in the UMC Utrecht

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security of radioactive sources in the UMC Utrecht Carolien Leijen Radiation Protection Supervisor

  2. Content • UMC Utrecht • Enhancing security • Sources • Critical processes • Threats • Security • Vulnerability • Improvements

  3. UMC Utrecht • 1 042 clinical beds • 31 000 admissions • 23 000 surgical interventions • 130 000 first visits • 11 000 employees • 3 500 students

  4. Security facts Every year • 200 notifications of theft/ loss • 6700 doors not locked properly • 90 persons behaving suspiciously • 30 denials of admittance

  5. Sources Critical processes Security elements in place Threats Vulnerability Improvements Cost-effectiveness Security project

  6. High risk Intermediate risk (Blood) irradiators Therapeutic radiopharmaceuticals Low risk Radioactive stock Reference sources Brachytherapy Sources

  7. Critical processes

  8. Threats • Fraud, including theft of goods by employees • Theft during transport or receipts • Theft of information • Bribes/ extortion/ blackmail • Entering by force

  9. Security elements in place • Certificates of good Conduct for employees and third parties • Identification card for employees and students • Entrance via card readers • (Digital) locks • Camera surveillance • Security department

  10. Vulnerability • Detection of breaches • Response time • Knowledge • Awareness • Compliance • Behaviour

  11. Improvements • Physical security measures • ID card with enhanced security technology • Door magnets • CCTV • Biometric access control • Anchoring therapy units • Key safe

  12. Improvements • Organisational measures • House rules • Third party workers • Visitors • Job descriptions • Access control policy • Screening • Enhancing awareness • Use of physical security measures • Compliance • Training and education

  13. Future challenges • Awareness of threats and risks by all involved • Instruction & education • Compliance with security procedures • Preparedness • Security plan • Cont(r)act with local police

More Related