Matthew Icenroad

As we close out the year, Matt reviews the importance of conducting risk assessments for healthcare facilities - HVAs.

Share this post

At the beginning of each year or planning cycle, healthcare organizations around the world conduct a Hazard Vulnerability Analysis (HVA) to understand their risks for natural, human and technological hazards. Healthcare vulnerability analyses are risk assessments that ultimately help healthcare organizations identify risk factors and calculate risk scores for specific hazards. The Centers for Medicare and Medical Services (CMS) requires healthcare organizations to complete a risk assessment and document any mitigation measures for the hazards identified.

Hazard vulnerability analysis tools identify specific healthcare risk factors in an effort to calculate a risk source score for specific hazards. Though many tools can be used to complete these analyses, Kaiser Permanente’s hazard vulnerability analysis tool is famous for being the “go-to” for healthcare organizations. As updates have been made to the tool over the years, organizations have created modified versions to suit their needs. Some have even expanded its use to other, more specific tools (e.g., Denver Children’s Tool).

We may have a tool in hand and the general knowledge of how to complete it, but the question still remains, how accurate can we be? Jensen Hughes is currently exploring the accuracy of healthcare hazard vulnerability analysis tools, the level of accuracy we can achieve in our assessments, and other tools and techniques the industry can utilize to be more accurate in our analyses.

Engaging with our healthcare partners across the country, we have identified many organizations that “shoot from the hip” on hazard vulnerability risk assessments and provide ballpark probabilities with little data to support their conclusions. At the opposite end of the spectrum are organizations that do a deep dive into the data to truly understand its historical and predictive probability. If the former approach does not meet the spirit of the assessment and the latter is too extensive, how do we find the middle of the road?

An approach used by Jensen Hughes is the Delphi Technique, originally developed by the RAND Corporation in the 1950s. The Delphi Technique is a systematic and qualitative forecasting method that involves the collection of opinions from experts through several rounds of questions. The technique relies on each expert utilizing their specialized knowledge on specific topics to forecast the outcome of future scenarios, predict the likelihood of events, or reach a consensus about particular topics.

With the Delphi Technique, a healthcare organization’s emergency management committee conducts a facilitated meeting to identify associated hazard risks. Through blind questioning, each member identifies their view on the probability and associated risks related to their functional area. Because their opinions remain anonymous, members are prevented from influencing each other.

Conducting a hazard vulnerability and risk assessment is the first and foundational step in any effective emergency preparedness program. This blog post is the beginning of a series of articles exploring hazard vulnerability analysis and emergency planning processes in relation to healthcare risk assessment, informed planning elements, and the accuracy and applicability of the assessment and process. In our next installment, we will dive into some details on the benefits and drawbacks of specific techniques.

Sign up to receive our insights straight to your inbox.

Get in Touch

By completing the above form you have read, understood and accept our Privacy terms as well as our Cookie terms. Read our Privacy Policy.

Jensen Hughes ensures non-discrimination in all programs and activities in accordance with Title VI of the Civil Rights Act of 1964. If you need more information or special assistance for persons with disabilities or limited English proficiency, contact the Jensen Hughes Compliance Team at 410-737-8677 or compliance@jensenhughes.com. 

More blog posts from Jensen Hughes

Fine Art Security: A High-Tech + Crucial Component of Estate Security

Feb 2, 2023

When most people think of fine art security, they likely visualize museums, art galleries and high-end jewelry boutiques. But many private clients own expensive collections of possessions, such as art.

Read more
Using Digital Technology to Transform Your Police Department

Jan 24, 2023

Remember when business guru and Cisco CEO John Chambers famously announced that every organization will be digital?

Read more
Just Accepted a Position as Police Chief? Here’s Who You Can Turn to for Advice

Jan 19, 2023

It’s surprising how many times police chiefs have asked our law enforcement consulting team for advice on who to reach out to for information, feedback, and guidance on addressing technical police-related matters or community crises.

Read more