Disaster Management should include security measures

This is a good time to be reminded that disaster management or your security policy may need to be extended to include management of threats, both internal and external to your organisation.  During the past years I’ve been personally involved with facilities where a resident entered the facility with a fire-arm, an intruder break-in during the night with a fire-arm, and another where intruders who entered the facility went into an occupied residents room. This last case related to intruders who had allegedly held-up the local bottle store earlier that same day.

Things happen which we don’t expect and we must be prepared as best we can.  It’s impossible to cover every possible eventuality but when events such as the shootings in Christchurch occur, it’s a reminder to ask are we doing enough?  For example, staff security rounds should be strictly enforced and documented to verify these were carried out. If you have surveillance cameras, where are your blind spots? If it’s the staff car park for staff going off duty late at night, improvements are desirable for staff safety. What about your processes for visitor verification? 

Security isn’t just about the people and environment but also about assets and information.  These should all be detailed in your policy documents.

HCSL are currently updating the security policies we provide ARC services to include reduction of risk from internal and external threats. This includes a procedure for lock-down. Let’s hope we never need to use it! 

For those of you wondering about how to debrief with your staff as a means to support them, there are some great resources available here.  For more resources on supporting others in relation to disaster type events, go here

Is the company email the employers property?

In simple terms, a work or company email is an employer’s property in the same way a direct dial phone number, phone (mobile and/or land line) and any other piece of equipment or resource is.  Therefore, as a matter of principle, the employer is entitled to have access to that email address as necessary in order to conduct its business activities.  Correspondingly, employees are obliged to co-operate with any request for access.

Where issues can arise is when an employee is allowed to use their work email for personal emails.  This can either be set out in policy or implicit.  In this case, care needs to be taken to ensure that personal emails are not read.  The access should be limited to ensuring the employer can access business related emails.

If an employee is objecting to providing access to their work email, you can address this by confirming that as a matter or principle the work email address is the employer’s property and you require access to all work emails.  Reinforce with the employee, you will not be reviewing personal emails and they can either forward those emails to their personal email address, delete them etc (as noted below).  However, you will require their password and access as needed.

If an employee continues to resist, inform them you will be making arrangements with your IT service provider to gain access to the work email and given their lack of co-operation, suspending their personal use until further notice.  If this step is required, it’s advisable to contact your employment law adviser first in order to ensure clear and succinct written communications are provided in respect of this step.

To avoid issues in the future, if there is no policy in place, or if there is a policy in place which does not address it, in the first instance all employees should be told that:

(a)       Any work assigned email address is for work purposes;

(b)       That where necessary you will require employees to provide access in order for you to ensure that email communications are dealt with as needed and to provide for business continuity;

(c)       Personal emails received at the work email address can be forwarded to a personal email address, deleted, flagged or moved into a separate folder so they remain private; and

(d)       A policy will be introduced to clarify email and internet access shortly, or recirculate the current policy (updated if/as needed).

Noting point (d), if there is no policy in place, it would also be timely to introduce an email and internet policy specifying how the internet and email facilities can and will be used.  Alternatively, if there is a policy, but it does not cover this situation, the policy should be updated.

Above article kindly contributed by: Dean Kilpatrick (Special Counsel – Employment), Anthony Harper Law,  For more information contact –  Email

Policies & Procedures

More Time HCSL

New Zealand compliant policies & procedures
Customised for you.

Documents HCSL

The HCSL solution gives you access to Policies and Procedure documents for the following catagories.

  • Consumer Rights

    (CR) 32 Documents

  • Service Delivery

    (SD) 23 Documents

  • Learning & Development

    (HR) 72 Documents

  • Food Service

    (FS) 38 Documents

  • Clinical Service

    (CS) 166 Documents

  • Safe & Appropriate Environment

    (SAE) 59 Documents

  • Entry To Service

    (Entry) 25 Documents

  • Infection Prevention & Anti-microbial Stewardship

    (IPAS) 38 Documents

  • Village

    (V) 33 Documents

  • Organisational Management

    (OM) 37 Documents

  • General Documents

    (GD) 26 Documents

  • Clinical Resources

    (Clinical) 1 Documents

  • Community

    (HCSS) 27 Documents

  • Meals On Wheels

    (MOW) 9 Documents

Current to October 2021

Want To Know More?