get help with this essay

Choose a topic on which to write the policy. This topic may address a needed change in technology, staffing, billing, diagnosis, etc. Using the services found in chapters 6-9 of the textbook, construct a policy using the seven steps of policy formation. Address the following:
1. Define the problem.
2. Assemble the evidence of the problem or need for a policy.
3. Construct alternative solutions to the problem.
4. Select the criteria for choosing the correct solution from the alternatives.
5. Predict the outcomes of the policy changes.
6. Confront the trade-offs of not having a policy or addressing the problem.
7. Decide on a recommendation.
In a 500-750-word essay, explain your policy’s intended use and evaluate the effect that your policy may have on patient care in America.
Prepare this assignment according to the APA guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is required.
This assignment uses a grading rubric. Instructors will be using the rubric to grade the assignment; therefore, students should review the rubric prior to beginning the assignment to become familiar with the assignment criteria and expectations for successful completion of the assignment.
Policy Formation
For this assignment the author will develop a policy that addresses the problem of security at Carolina Behavioral Care, PA located in Durham, NC. Let’s find out the solution using the appropriate algorithm:
Defining the problem
Carolina Behavioral Care is a 10,000 square foot two story mental health facility with no onsite security or emergency security plan. With increasing occurrences of 911 calls to this facility the author has is proposing a policy to protect staff and patients.
Assemble the evidence of the problem or need for a policy
On each floor there are two doors leading to the back of the clinic where the Clinicians and nurses offices are. The doors leading to the clinicians offices are not able to lock, therefore patients and unauthorized personnel can freely roam the facility at all times. Patients are frequently found in the break room area or simply roaming the halls. Naturally, it is unfeasible to have security guards at such a small location, so a new policy that addresses a change in technology should be developed.
Construct and alternative solution to the problem
Suggested alternative solutions to the problem are as follows. For security purposes all doors leading to restricted areas should be locked at all times. The best method for this would be to have a keyless entry with code only for restricted access. This will prevent unwanted access to clinical areas. For emergency purposes there should be a one key access code on the telephone. What this means is, with the push of one button on the telephone the conversation (between patient and provider) automatically goes to every employees phone to inform them of an emergency. This gives the provider time to coach the patient to keep others safe but at the same time the police are on the way because all employees can hear the conversation. This allows for the employees to remove all other patients and secure the building. The front desk should be a secure area with glass that locks at the end of each shift or in the event of an emergency.
Confront the trade-offs of not having a policy or addressing the problem
Not having strict security measure may mean that some people, especially the sneakiest, or mentally ill are likely to enter restricted areas and roam around. Not having a restricted access and speaker emergency call means that employees cannot feel safe.
Decide on a Recommendation
The recommendation is to develop a policy that calls for the new technology, i.e. restricted access to clinical areas and the speaker emergency call with the touch of one button. This policy assures that no unauthorized persons enter to restricted areas. Also, in the event of emergency the provider can push one button on the telephone which makes their conversation heard by all employees in the building making this the most reliable security methods.