Podcast
Questions and Answers
How are inmates approved for Protective Custody identified in the Arizona Correctional Information System (ACIS)?
How are inmates approved for Protective Custody identified in the Arizona Correctional Information System (ACIS)?
- By their crime
- By their sentence length
- By their name
- By a special code (correct)
What is the first step in the Protective Custody identification process?
What is the first step in the Protective Custody identification process?
- Staff reviewing the inmate's need for protection
- Isolating the inmate in a safe area
- Inmates making a written or verbal request (correct)
- Notifying the Shift Commander
What should staff do when they receive a written or verbal request for protection from an inmate?
What should staff do when they receive a written or verbal request for protection from an inmate?
- Ignore the request
- Isolate the inmate and notify the Shift Commander (correct)
- Refer the inmate to the county jail
- Ask the inmate to provide evidence of the threat
What is the purpose of the Protective Custody Review Checklist, Form 805-9?
What is the purpose of the Protective Custody Review Checklist, Form 805-9?
What is one of the criteria that must be met to initiate a Protective Custody review?
What is one of the criteria that must be met to initiate a Protective Custody review?
Flashcards are hidden until you start studying