Hospital security guards should prioritize de-escalation techniques and less-lethal equipment when dealing with uncooperative or dangerous individuals to ensure safety while minimizing harm. Below are generally accepted choices that have proven to be useful and effective options:
Less-Lethal Equipment for Hospital Security Guards
- Pepper Spray (OC Spray) – Used to temporarily impair vision and breathing, allowing guards to gain control of a situation.
- Pepper Gel – Similar to pepper spray but less likely to affect bystanders, as it sticks to the target and does not disperse into the air.
- Tasers/Stun Devices – Provide an electric shock to incapacitate individuals momentarily without causing lasting harm.
- Expandable Batons – Useful for multiple applications, including:
- Defensive Blocking – Guards can use batons to deflect attacks.
- Controlled Strikes – Applied with minimal force to deter aggression.
- Creating Safe Distance – Provides a barrier between the security officer and the uncooperative individual.
- Breaking Grabs or Holds – Used to release an attacker’s grip safely.
- Disarming Techniques – Can aid in neutralizing individuals who may possess weapons.
- Defense and Crowd Control in extreme situations.
- Restraint Devices – Soft restraints or control straps help safely secure aggressive patients or intruders without injury.
- Body-Worn Cameras – Used to document incidents, which can deter aggression and improve transparency.
- Emergency Duress Alarms – Alerts other staff or security teams when a situation escalates.
- Impact-Reducing Shielding – Lightweight shields for defense in cases of extreme physical aggression.
Security teams should receive specialized training on how to properly deploy these tools while following hospital policies and ensuring compliance with the Bureau of Security and Investigative Services.

Defensive Tactics for Physical Intervention
- Arm Bars – Used to safely control an individual’s movement by immobilizing their arm, preventing them from striking or resisting.
- Takedowns – Controlled techniques used to bring an aggressive person to the ground while minimizing harm.
- Come-Alongs – Escort techniques used to guide an individual out of a restricted area or into a secure holding space.
- Joint Locks – Leveraging an individual’s joints to reduce resistance and prevent further aggression.
- De-Escalation Positioning – Using stance and movement or tactical repositioning to minimize risk while maintaining control.
- Pressure Point Compliance – Applying minimal force to specific nerve points to deter aggression safely.
- Defensive Blocking & Redirecting – Using hands, batons, or shields to deflect strikes or lunges.
- Team Tactics – Coordinated security responses, such as two-person control techniques, for handling high-risk individuals.
All of these techniques require proper training to ensure legal compliance, safety, and effectiveness while minimizing risk to both security personnel and the individuals involved.
Documentation & Incident Reporting
Proper documentation is essential to ensure accountability, legal compliance, and transparency in security operations. Security personnel should follow these best practices:
- Detailed Incident Reports – Record key details such as date, time, location, involved individuals, and actions taken.
- Objective Language – Reports should remain factual and free of personal opinions or assumptions.
- Body-Worn Camera Footage – If applicable, reference and preserve footage for investigative purposes.
- Witness Statements – Collect signed statements from staff, patients, or visitors who observed the event.
- Use of Force Documentation – If force was used, provide a clear justification supported by relevant policies.
- Medical and Injury Reports – Document any injuries sustained by security personnel or individuals involved.
- Follow-Up Procedures – Outline any investigations, policy changes, or corrective measures taken after the incident.
- Chain of Custody Forms – If physical evidence (such as weapons) is involved, maintain proper documentation of handling and storage.
Security personnel should be trained in accurate report writing to ensure that all documentation is legally sound and admissible in investigations or legal proceedings
Conclusion
A well-structured security strategy is essential in maintaining a safe and controlled hospital environment while minimizing risks, injuries, and legal claims. By implementing less-lethal equipment, defensive tactics, and proactive safety measures, hospital security teams can effectively manage confrontational situations without compromising patient care or staff well-being. Training in de-escalation, proper documentation, and ethical use of force ensures security personnel operate within legal compliance while promoting a secure, trustworthy atmosphere for all individuals in the facility.
Additionally, establishing a standard of care in hospital security ensures uniform safety protocols, consistent response strategies, and professional accountability. A clearly defined standard helps mitigate liability, reinforces best practices, and demonstrates a commitment to patient and staff protection. By adhering to industry-accepted security guidelines, hospitals can proactively address safety concerns, reduce incidents, and cultivate an environment where security measures align with healthcare priorities.
As hospitals continue to face evolving security challenges, prioritizing safety, preparedness, and responsible intervention will remain key to reducing liability and fostering a secure healthcare environment for patients, staff, and visitors alike.
About the Author
Jeffrey C. Kearnan is the founder of Kearnan Consulting Group, LLC, bringing over 36 years of professional experience in law enforcement, security consulting, and emergency management. His expertise spans threat assessments, policy development, tactical training, and crisis response, making him a sought-after expert witness in litigation involving security procedures and use-of-force policies.
Kearnan specializes in expert witness consultation for excessive force complaints and security litigation, frequently working with attorneys, municipalities, and county governments on legal disputes related to police practices, policies, and procedures. His cases often involve 1983 civil rights claims, where he provides fact-based analysis to assess the lawfulness, necessity, and appropriateness of operational responses. His expert opinions are developed using verifiable discovery evidence, ensuring credibility and adherence to well-established police practices.
His consulting firm focuses on protecting, planning, and preparing organizations, including churches, schools, and businesses, against manmade and natural disaster scenarios. His work emphasizes risk mitigation, security strategy, and proactive safety planning, ensuring institutions are equipped to handle evolving threats.