Podcast
Questions and Answers
Match the following items to their potential risks in an institution:
Match the following items to their potential risks in an institution:
Keys = Access to restricted areas Acetylene cutting torches = Escape attempts Cellular phones = Illicit drug trafficking Hobby craft tools = Injury potential
Match the following policy documents with their descriptions:
Match the following policy documents with their descriptions:
Commissioner’s Directive 573 = General guidelines for item control Institutional Standing Orders = Specific directions for each institution Post Orders = Detailed instructions regarding operations Policy documents = Frameworks for security measures
Match the following items with their categories under CD 573:
Match the following items with their categories under CD 573:
Keys = Critical items for security Communication equipment = Tools for safety coordination Dangerous Substances = Items posing safety risks Contractor tools = Equipment used by external workers
Match the following reasons for control with their corresponding implications:
Match the following reasons for control with their corresponding implications:
Match the following tools with their usage in daily operations:
Match the following tools with their usage in daily operations:
Match the following dangers with their relevant items:
Match the following dangers with their relevant items:
Match the following key aspects with their corresponding directives:
Match the following key aspects with their corresponding directives:
Match the following items to their definitions as critical items:
Match the following items to their definitions as critical items:
Match the following classes of keys with their descriptions:
Match the following classes of keys with their descriptions:
Match the following types of keys with their examples:
Match the following types of keys with their examples:
Match the following security classifications with their characteristics:
Match the following security classifications with their characteristics:
Match the following key classes with their handling rules:
Match the following key classes with their handling rules:
Match the following terms related to security to their definitions:
Match the following terms related to security to their definitions:
Match the following keys with their corresponding usage details:
Match the following keys with their corresponding usage details:
Match the following items with their purposes:
Match the following items with their purposes:
Match the following control measures with their importance:
Match the following control measures with their importance:
Match the type of area with its key requirements:
Match the type of area with its key requirements:
Match the following key characteristics with their descriptions:
Match the following key characteristics with their descriptions:
Match the following key types with their security features:
Match the following key types with their security features:
Match the following roles with their responsibilities:
Match the following roles with their responsibilities:
Match the following key usage scenarios with their classification:
Match the following key usage scenarios with their classification:
Match the following types of keys with their specific risk levels:
Match the following types of keys with their specific risk levels:
Match the classes of tools with their descriptions:
Match the classes of tools with their descriptions:
Match the tool with its classification:
Match the tool with its classification:
Match the immediate action with its corresponding situation when a key or proximity card is lost:
Match the immediate action with its corresponding situation when a key or proximity card is lost:
Match the tool type with its usage:
Match the tool type with its usage:
Match the type of security measure with its relevant tool class:
Match the type of security measure with its relevant tool class:
Match the action to its category during a security check:
Match the action to its category during a security check:
Match the following tools with their security classification color code:
Match the following tools with their security classification color code:
Match the scenario with the necessary follow-up action:
Match the scenario with the necessary follow-up action:
Match the types of threats posed by tools to their descriptions:
Match the types of threats posed by tools to their descriptions:
Match the type of offender tool use with its context:
Match the type of offender tool use with its context:
Match the security classification with its potential risk:
Match the security classification with its potential risk:
Match the item with its operational relevance:
Match the item with its operational relevance:
Match the key and tool control terminology with their correct descriptions:
Match the key and tool control terminology with their correct descriptions:
Match the type of key safe with its primary function:
Match the type of key safe with its primary function:
Match the key control terms with their roles:
Match the key control terms with their roles:
Match the situation with the appropriate key control measure:
Match the situation with the appropriate key control measure:
Match the function with the correct term:
Match the function with the correct term:
Match the base materials with their key control applications:
Match the base materials with their key control applications:
Match the terminology with relevant operational context:
Match the terminology with relevant operational context:
Match the description with the type of key safe:
Match the description with the type of key safe:
Match the process with the correct key terminology:
Match the process with the correct key terminology:
Match each key element with its importance:
Match each key element with its importance:
Match the type of key storage with the appropriate need:
Match the type of key storage with the appropriate need:
Match the key management term with its description:
Match the key management term with its description:
Match the key storage type with its specific characteristic:
Match the key storage type with its specific characteristic:
Match the control measure with the scenario it addresses:
Match the control measure with the scenario it addresses:
Match the concept with its utility in key management:
Match the concept with its utility in key management:
Match the type of lock with its description:
Match the type of lock with its description:
Match the following security layers with their purpose:
Match the following security layers with their purpose:
Match the key control procedures with their importance:
Match the key control procedures with their importance:
Match the type of institution with its security characteristics:
Match the type of institution with its security characteristics:
Match the item with its locking necessity:
Match the item with its locking necessity:
Match the following dangerous substances with their corresponding hazards:
Match the following dangerous substances with their corresponding hazards:
Match the security risks with their control measures:
Match the security risks with their control measures:
Match the following tool control activities with their purposes:
Match the following tool control activities with their purposes:
Match the electronic key control features with their functions:
Match the electronic key control features with their functions:
Match the key control task with its action:
Match the key control task with its action:
Match the term with its definition:
Match the term with its definition:
Match the following scenarios with the appropriate cautionary advice:
Match the following scenarios with the appropriate cautionary advice:
Match the operational procedure with its purpose:
Match the operational procedure with its purpose:
Match the following procedures regarding outside contractors with their descriptions:
Match the following procedures regarding outside contractors with their descriptions:
Match the following tool inspection tasks with their importance:
Match the following tool inspection tasks with their importance:
Match the term with its related action:
Match the term with its related action:
Match the security principle with its application:
Match the security principle with its application:
Match the electronic locking device components with their roles:
Match the electronic locking device components with their roles:
Match the type of key with its usage context:
Match the type of key with its usage context:
Match the following construction scenarios with their outcomes:
Match the following construction scenarios with their outcomes:
Match the following contractor responsibilities with their corresponding rules:
Match the following contractor responsibilities with their corresponding rules:
Match the key control protocol with its requirement:
Match the key control protocol with its requirement:
Match the security area with its necessary actions:
Match the security area with its necessary actions:
Match the following color coding of tools with their significance:
Match the following color coding of tools with their significance:
Match the key control responsibility with its expected behavior:
Match the key control responsibility with its expected behavior:
Match the storage method with its description:
Match the storage method with its description:
Match the tool class with its category:
Match the tool class with its category:
Match the action with when to perform it:
Match the action with when to perform it:
Match the procedure with its requirement:
Match the procedure with its requirement:
Match the following tools with their risk:
Match the following tools with their risk:
Match the hobby craft tools with their application:
Match the hobby craft tools with their application:
Match the item with its storage condition:
Match the item with its storage condition:
Match the authority with their responsibility:
Match the authority with their responsibility:
Match the color code with its associated tool status:
Match the color code with its associated tool status:
Match the tool procedure with its guideline:
Match the tool procedure with its guideline:
Match the type of tool with its registration requirement:
Match the type of tool with its registration requirement:
Match the tool usage guideline with the timing:
Match the tool usage guideline with the timing:
Match the incident with its potential response:
Match the incident with its potential response:
Match the following risks with their control measures:
Match the following risks with their control measures:
Flashcards
What is Commissioner's Directive 573?
What is Commissioner's Directive 573?
Directive 573 outlines the general guidelines for controlling items critical to the security and safety of a correctional institution. It covers items like keys, tools, dangerous substances and communication equipment.
What are 'items critical to the security and safety of the institution'?
What are 'items critical to the security and safety of the institution'?
Items that are controlled by Commissioner's Directive 573 due to their potential for security risks and safety threats within the institution.
Explain Institutional Standing Orders.
Explain Institutional Standing Orders.
Each correctional facility has its own set of rules about how to control critical items, which are more specific than Directive 573.
What are Post Orders?
What are Post Orders?
The most specific set of rules and guidelines for controlling critical items within a correctional facility. These are tailored to the specific location and security measures.
Signup and view all the flashcards
Why is access to Restricted Movement area keys a major concern?
Why is access to Restricted Movement area keys a major concern?
Offenders gaining access to restricted areas could lead to harm for inmates requiring protection and threaten the overall security of the institution.
Signup and view all the flashcards
Why is controlling access to tools like cutting torches and ladders important in prisons?
Why is controlling access to tools like cutting torches and ladders important in prisons?
Tools like cutting torches, ladders, and bolt cutters might be used by offenders to escape, posing a threat to the safety of both the institution and the public.
Signup and view all the flashcards
Explain the risk of inmates having access to cell phones?
Explain the risk of inmates having access to cell phones?
Access to cell phones can be used by inmates to facilitate illegal activities such as drug trafficking, jeopardizing the safety and security of the institution.
Signup and view all the flashcards
Why is the control of critical items so crucial?
Why is the control of critical items so crucial?
The control of critical items is essential to maintain the security and safety of the institution, its inmates, staff, and the public.
Signup and view all the flashcards
Prohibited Keys (Class P)
Prohibited Keys (Class P)
These keys are crucial for the institution's safety and security. Losing them to outsiders could have severe consequences like compromising security and endangering staff, offenders, and the public.
Signup and view all the flashcards
Restricted Keys (Class R)
Restricted Keys (Class R)
These keys are used by staff to maintain control within the institution. Their misuse could lead to security compromises and endangerment of staff, offenders, and the public.
Signup and view all the flashcards
Non-restricted Keys (Class N)
Non-restricted Keys (Class N)
These keys are used for various daily operational needs. Their misuse by offenders has minimal consequences.
Signup and view all the flashcards
Folger Adams Key
Folger Adams Key
This type of key is designed to be difficult to duplicate and pick, making it ideal for locking critical areas in the institution.
Signup and view all the flashcards
Best Key
Best Key
Locking devices with 'Best' keys are used for sensitive areas or equipment, providing an extra layer of protection.
Signup and view all the flashcards
Proximity Card
Proximity Card
A plastic card with a microchip that identifies the cardholder and the locking devices they are authorized to access.
Signup and view all the flashcards
Proximity Card for Offenders
Proximity Card for Offenders
Offenders are also issued proximity cards, but their functionality is restricted, allowing access only to specific areas like their accommodation buildings.
Signup and view all the flashcards
Manual Override for Proximity Cards
Manual Override for Proximity Cards
Locking devices that use proximity cards can be opened manually with a key in case of a major power failure.
Signup and view all the flashcards
Electronic Override for Proximity Cards
Electronic Override for Proximity Cards
The system can be over-ridden electronically for rapid access in emergency situations such as lockdowns or fire.
Signup and view all the flashcards
Key Inventory Management
Key Inventory Management
The Security Maintenance Officer is responsible for maintaining a complete record of all keys within the institution.
Signup and view all the flashcards
Security Classification and Control
Security Classification and Control
The security level of an institution determines the level of control and supervision necessary. Higher security levels require more stringent measures.
Signup and view all the flashcards
Variations in Control Procedures
Variations in Control Procedures
Institutions have different control procedures for keys and other items based on their security level. The higher the level, the more critical control becomes.
Signup and view all the flashcards
Prohibition of Personal Cell Phones
Prohibition of Personal Cell Phones
Staff are not permitted to bring personal cell phones into the institution. Cell phones are prohibited due to security concerns and communication protocols.
Signup and view all the flashcards
Institutional Variations in Control Measures
Institutional Variations in Control Measures
All institutions do not have the same control procedures for items like keys and cell phones.
Signup and view all the flashcards
What is a key ring?
What is a key ring?
A metal ring used to group keys together for a specific operational area.
Signup and view all the flashcards
What is a key ring tag?
What is a key ring tag?
A numbered tag attached to a key ring, identifying the keys and their specific operational area.
Signup and view all the flashcards
What is a Key Registry?
What is a Key Registry?
A written record maintained by the Security Maintenance Officer (SMO) that lists all keys, their identifiers, and the locking devices they operate.
Signup and view all the flashcards
What are key tags?
What are key tags?
Tags assigned to staff members, inscribed with their unique numbers or identifiers, used to track key borrowing.
Signup and view all the flashcards
How does the key tag system work?
How does the key tag system work?
A visual and physical system that uses key tags to control key issuance and ensure accountability.
Signup and view all the flashcards
What are emergency keys?
What are emergency keys?
Keys designated for rapid access during emergencies, such as fires, riots, or escapes.
Signup and view all the flashcards
What is a key safe?
What is a key safe?
A secure metal box, often locked with a key, used to store keys for specific operational areas.
Signup and view all the flashcards
What is an operational area key safe?
What is an operational area key safe?
A key safe located in each major operational area within the institution, containing keys specific to that location.
Signup and view all the flashcards
What is a duty office key safe?
What is a duty office key safe?
This key safe, located in the main duty office, stores emergency keys, armoury keys, fire walk keys, and back-up vehicle keys.
Signup and view all the flashcards
What is a main gate key safe?
What is a main gate key safe?
A larger key safe often located at the main gate, used to store keys for operational areas not staffed 24/7.
Signup and view all the flashcards
What is a key issue register?
What is a key issue register?
A written log used to record the time, date, person receiving the key, key description, and signatures for issuance and return.
Signup and view all the flashcards
What are Commissioner's Directives?
What are Commissioner's Directives?
A specific directive outlining the general guidelines for controlling critical items, such as keys, tools, and communication devices.
Signup and view all the flashcards
What are Institutional Standing Orders?
What are Institutional Standing Orders?
These are rules specific to each correctional facility that outline how to control critical items in a particular setting.
Signup and view all the flashcards
Why is controlling access to restricted movement area keys a major concern?
Why is controlling access to restricted movement area keys a major concern?
Offenders gaining access to restricted areas could lead to harm for inmates requiring protection and threaten the overall security of the institution.
Signup and view all the flashcards
Why is controlling tools like cutting torches and ladders important in prisons?
Why is controlling tools like cutting torches and ladders important in prisons?
These tools could be used by offenders to escape or create disturbances, posing a threat to safety.
Signup and view all the flashcards
What is a Double Lock?
What is a Double Lock?
A locking device where the tumbler is rolled twice, making the plunger locked and unable to move. The door can't be opened or closed without a key.
Signup and view all the flashcards
What is a Folger-Adams Key?
What is a Folger-Adams Key?
A key with a specific cut and groove that is unique to each locking device. Each key is assigned to a specific area or purpose.
Signup and view all the flashcards
What is Layered Protection?
What is Layered Protection?
A system of multiple security measures, like locks and barriers, designed to prevent unauthorized access. Each layer increases difficulty for potential threats.
Signup and view all the flashcards
What is Key Verification?
What is Key Verification?
The process of confirming every key assigned to a specific area, both the physical presence and location within the key safe, at the start and end of a shift.
Signup and view all the flashcards
What is a 'Pat-Down'?
What is a 'Pat-Down'?
An immediate self-check to ensure no unauthorized keys are being taken off-duty. This practice helps uphold key control and security.
Signup and view all the flashcards
What is an Emergency Key?
What is an Emergency Key?
A key assigned for urgent or emergency situations allowing immediate access to specific areas or locking devices.
Signup and view all the flashcards
What is a Key Tag System?
What is a Key Tag System?
A system that uses tags attached to keys to identify and track their location and restrictions.
Signup and view all the flashcards
What is Key Vigilance?
What is Key Vigilance?
The act of being aware of who is attempting to access a specific locking device and verifying their authorization before allowing access.
Signup and view all the flashcards
What is a Tampered Locking Device?
What is a Tampered Locking Device?
An incident in which a locking device has been altered or damaged, potentially compromising security. This must be reported promptly.
Signup and view all the flashcards
What is an SOR (Security Observation Report)?
What is an SOR (Security Observation Report)?
A detailed report filed about security incidents, including details about a tampered locking device. This document provides evidence and documentation of the issue.
Signup and view all the flashcards
What is a Restricted Movement Unit (RMU)?
What is a Restricted Movement Unit (RMU)?
A designated area within an institution that requires heightened security measures, typically housing inmates with special security needs.
Signup and view all the flashcards
What is Proximity Card Access?
What is Proximity Card Access?
A system that uses electronic cards to control access to specific areas, often used to enhance security measures within an institution.
Signup and view all the flashcards
Dangerous Substance
Dangerous Substance
Any substance that, if not stored and disposed of properly, could pose a fire hazard.
Signup and view all the flashcards
CO-PW's Role in Dangerous Substance Control
CO-PW's Role in Dangerous Substance Control
CO-PWs play a vital role in ensuring dangerous substances are stored and used appropriately, keeping track of their location, users, and intended purpose.
Signup and view all the flashcards
Contractor Tools & Security Risk
Contractor Tools & Security Risk
Outside contractors require various tools for their work. These tools, if misused, pose a security risk for the institution and endanger staff, offenders, and the public.
Signup and view all the flashcards
Tool Registry for Contractors
Tool Registry for Contractors
Before entering the institution, every contractor's tools are authorized and documented on a Tool Registry form to restrict unauthorized items.
Signup and view all the flashcards
Contractor Vehicle Search by CO-PWs
Contractor Vehicle Search by CO-PWs
A thorough search is conducted by CO-PWs to check the contractor's vehicle for any non-authorized tools or dangerous substances that are not on the Tool Registry.
Signup and view all the flashcards
Verification of Tools Upon Contractor Departure
Verification of Tools Upon Contractor Departure
CO-PWs are tasked with verifying the presence of all tools listed on the Tool Registry before the contractor leaves the institution.
Signup and view all the flashcards
Locking Toolboxes for Secure Storage
Locking Toolboxes for Secure Storage
Locking toolboxes are required to secure contractor's tools not immediately needed on the job site.
Signup and view all the flashcards
Prohibition of Cellular Phones for Contractors
Prohibition of Cellular Phones for Contractors
Cellular phones are strictly prohibited for contractors entering the institution to prevent communication with potential offenders.
Signup and view all the flashcards
Electronic Keys for Access Control
Electronic Keys for Access Control
Electronic keys, such as toggles and switches, are used to control access to specific doors and barriers within the institution.
Signup and view all the flashcards
Manual Keys as Backup
Manual Keys as Backup
A manual key system serves as a backup for the electronic key system in case of power failure or malfunction.
Signup and view all the flashcards
Master Panel for Door Status
Master Panel for Door Status
A master panel provides visual information about the status of each door or barrier controlled by electronic keys.
Signup and view all the flashcards
CO-PW's Role in Contractor Tool Control
CO-PW's Role in Contractor Tool Control
The CO-PW plays a critical role in ensuring tool control for contractors by initially searching contractor vehicles and escorting them to their worksite.
Signup and view all the flashcards
Hacksaw Blade Incident
Hacksaw Blade Incident
An example where a contractor's hacksaw contained concealed extra blades highlighting the need for thorough inspection of contractor tools.
Signup and view all the flashcards
Defeating Proximity Cards
Defeating Proximity Cards
Staff should be aware of the possibility of offenders attempting to gain unauthorized access by following someone with a proximity card.
Signup and view all the flashcards
Routine lock checks
Routine lock checks
The process of verifying the security of all locks and locking mechanisms throughout a correctional facility, including doors, gates, and windows. This is done by physically checking them to ensure they are functioning properly.
Signup and view all the flashcards
What are 'critical items'?
What are 'critical items'?
Keys, cards, or other devices which can control access to restricted areas or critical resources in a correctional facility.
Signup and view all the flashcards
What is a 'key loss procedure'?
What is a 'key loss procedure'?
A set of procedures that outline the specific steps for dealing with a lost key or proximity card within a correctional facility. This involves reporting the loss, verifying records, and launching a search.
Signup and view all the flashcards
Tools in a Correctional Facility
Tools in a Correctional Facility
Tools that are considered essential for the everyday operation and upkeep of a correctional facility, but also have the risk of being misused for escape attempts or weapon construction.
Signup and view all the flashcards
What are the 'Tool Classes'?
What are the 'Tool Classes'?
A classification system for tools used within a correctional facility. This system categorizes tools based on their potential risk of misuse by offenders.
Signup and view all the flashcards
What are 'Non-restricted tools'?
What are 'Non-restricted tools'?
Tools that are deemed safe for offenders to use without direct supervision. They are often marked with a yellow color code and are usually used in routine tasks.
Signup and view all the flashcards
What are 'Restricted tools'?
What are 'Restricted tools'?
Tools that are considered to have a higher risk of being used for escape attempts or weapon construction. They are often marked with a blue color code and are only allowed to be used by offenders under the direct supervision of staff.
Signup and view all the flashcards
What are 'Prohibited tools'?
What are 'Prohibited tools'?
Tools that are deemed particularly dangerous in the hands of offenders. They are often marked with a red color code and are never issued to offenders. They are only used by staff under direct supervision.
Signup and view all the flashcards
What are 'Kitchen Knives'?
What are 'Kitchen Knives'?
A specific type of prohibited tool used by inmates for the preparation and cooking of their meals. These knives are often secured to a knife safe or a metal counter.
Signup and view all the flashcards
What is 'key accountability'?
What is 'key accountability'?
The act of physically securing a key or proximity card to a designated location, often within a locked safe or a specific area. This process is crucial for maintaining accountability of critical items.
Signup and view all the flashcards
What is a 'key search'?
What is a 'key search'?
The act of physically searching for a lost key or proximity card. This search is usually conducted by staff members in the area where the loss occurred.
Signup and view all the flashcards
What is a 'Missing Tool Report'?
What is a 'Missing Tool Report'?
A formal report that documents the circumstances of a lost key or proximity card, providing key details about the incident for investigation and future prevention.
Signup and view all the flashcards
What is a 'Restricted Movement Area'?
What is a 'Restricted Movement Area'?
Areas within a correctional facility that are considered to be high security, usually because they house particularly high-risk offenders. Access to these areas is strictly controlled.
Signup and view all the flashcards
What is 'Communication Equipment'?
What is 'Communication Equipment'?
A critical item that allows access to different communication technologies, which can pose a security risk if misused by offenders. This is particularly relevant in the context of contraband and illegal activities.
Signup and view all the flashcards
What is 'Critical Item Control'?
What is 'Critical Item Control'?
A crucial aspect of maintaining security within a correctional facility. It involves the systematic control and management of all vital items to prevent unauthorized access or misuse.
Signup and view all the flashcards
What is the color scheme for Shadow Boards?
What is the color scheme for Shadow Boards?
Shadow boards should be painted light green, with restricted tools marked in blue. This helps staff quickly see if a tool is missing.
Signup and view all the flashcards
Where are Prohibited tools stored?
Where are Prohibited tools stored?
Prohibited tools, marked in red, are stored in secure areas inaccessible to offenders. This ensures dangerous tools don't fall into wrong hands.
Signup and view all the flashcards
How are Non-Restricted tools managed?
How are Non-Restricted tools managed?
Non-restricted tools, marked in non-color or a different color, can be issued daily as kits for specific tasks. This allows for flexibility in work projects.
Signup and view all the flashcards
What's the alternative storage method for tools?
What's the alternative storage method for tools?
If secure storage isn't possible, a tool box or cabinet with a padlock and inventory list is used. The key point is to prevent unauthorized access.
Signup and view all the flashcards
What's the daily routine for tool control?
What's the daily routine for tool control?
It's a crucial practice to daily account for all tools. This means checking if anything is missing and investigating any discrepancies.
Signup and view all the flashcards
Who can possess Restricted or Prohibited tools?
Who can possess Restricted or Prohibited tools?
Offenders should never possess Restricted or Prohibited tools unless directly supervised by a staff member. This prevents potential misuse or escape attempts.
Signup and view all the flashcards
What should you do if you find tools left unattended?
What should you do if you find tools left unattended?
If you see tools left unattended, report it to the right authority. This prevents unauthorized access and ensures safety.
Signup and view all the flashcards
How do you handle tools when working with contractors?
How do you handle tools when working with contractors?
When escorting contractors, ensure their tools are secure and locked. This prevents any unwanted or unauthorized use by offenders.
Signup and view all the flashcards
What should you do if unsure about an offender's tool authorization?
What should you do if unsure about an offender's tool authorization?
If unsure about an offender's authorization to use a tool, verify before allowing them to proceed. This ensures responsible use of tools.
Signup and view all the flashcards
What's important for maintaining good tool control?
What's important for maintaining good tool control?
Regularly reviewing key and tool control policies keeps everyone informed. This ensures consistent and proper practices.
Signup and view all the flashcards
Why are hobby craft tools important to control?
Why are hobby craft tools important to control?
Hobby craft tools, while seemingly harmless, need strict control. They may be used as weapons, so proper procedures are essential.
Signup and view all the flashcards
How are hobby craft tools authorized for offenders?
How are hobby craft tools authorized for offenders?
Hobby craft tools must be authorized for each offender. This involves a permit displayed in their cell, preventing unauthorized use.
Signup and view all the flashcards
What's the role of cell searches regarding hobby craft tools?
What's the role of cell searches regarding hobby craft tools?
Cell searches should verify that hobby craft tools are present and accounted for. This prevents unauthorized possession and ensures safety.
Signup and view all the flashcards
Can offenders share hobby craft tools?
Can offenders share hobby craft tools?
The authorization to possess hobby craft tools is not transferable. Each offender needs their own authorization for responsible use.
Signup and view all the flashcards
Where can offenders use hobby craft tools?
Where can offenders use hobby craft tools?
Hobby craft tools can only be used in an offender's cell or other authorized areas. This prevents misuse and unauthorized possession.
Signup and view all the flashcardsStudy Notes
Key and Tool Control Policy
- Commissioner's Directive 573 (1992-11-01): Establishes guidelines for controlling items critical to institution safety and security, including keys, tools, hobby craft tools, communication equipment, dangerous substances (gasoline, propane, solvents), and contractor tools/equipment/keys.
- Officer Responsibility: Understanding and adhering to policies outlined in Commissioner's Directive 573, Institutional Standing Orders, and Post Orders.
- Institutional Standing Orders: Provide more specific directions tailored to each institution's security classification, facility structure, and layout.
- Post Orders: Provide even more specific directions for each post.
- Why Control is Important: Uncontrolled access to keys and tools allows for misuse, posing a threat to institutional security, safety for staff, offenders, and the public. Examples include potential escape attempts, unauthorized access to restricted areas, and facilitation of illicit activities.
- Security Classification: Risk and control measures vary based on institutional security classification (maximum, medium, minimum, multi-level). Higher classifications necessitate stricter control.
Key Control
- Key Classes: Keys are categorized for varying levels of risk:
- Prohibited (P): Critically important to safety and security, e.g., armory, armed/central control posts, communication control, and electronic security equipment areas (needs extra handling and storage procedures).
- Restricted (R): Security keys for custody and control within the institution (e.g., cell doors, movement barriers, fire doors, internal control posts, key safes, shop doors), also needs standard handling procedures but less strict than prohibited.
- Non-Restricted (N): Keys for daily operational needs with negligible misuse risk (e.g., workshop cupboards, offender accommodation, storage lockers).
- Key Types:
- Folger-Adams Key: High-security locking devices for critical areas/documents/equipment. More difficult to pick and duplicate.
- "Best" Key: For less critical areas, offering a second layer of protection; commonly used with Folger-Adams.
- Proximity Card: Electronic key; requires a "card reader" device. Allows for tracking access. Can be manually overridden in emergencies.
Tool Control
- Tool Classes: Tools are categorized based on risk:
- Non-Restricted (N): Low escape/weapon risk; generally used without direct staff supervision (e.g., wood saw, socket wrench, tape measure).
- Restricted (R): High escape/weapon risk; used by offenders under direct staff supervision (e.g., hammers, screwdrivers, hacksaw blades, pliers).
- Prohibited (P): Extremely dangerous in offenders' hands; never issued to offenders without direct supervision (e.g., knives, acetylene cutting torches, bolt cutters).
- Tool Storage: Methods include shadow boards (color-coded), tool cribs (restricted tools), secure storage (prohibited tools), individual tool kits, tool boxes/cabinets (with inventories).
Key and Tool Control Procedures
- Daily Verification: Ensure all assigned keys/tools are accounted for at the start and end of each shift, checking against inventory and recording this in shift logs.
- Key/Tool Handling: Proper handling by providing and receiving keys from authorized staff; prohibiting throwing keys.
- Security Checks: Regularly verify for open locking mechanisms/damaged devices and report immediately.
- Loss Reporting: Report missing keys or tools immediately to the appropriate authority.
- Contractor Tool Control: Authorized tools/equipment/keys; inventory before and after contractor activities. Check for extra items.
- Offender Access Restrictions: Ensure prohibited and restricted items are not accessible to offenders.
Emergency Keys
- Quick Access during Emergencies: A limited selection of emergency keys (often in a specific location or color-coded) is for speed during crises.
Dangerous Substances Control
- Control Necessary: Procedures exist for the acquisition, use, and storage of dangerous substances like gasoline, propane, solvents, etc., to maintain safety.
- Officer vigilance: Officers need to be aware of locations/people handling these substances, ensuring they are used and stored appropriately.
- Contractor Oversight: Verification tools/substances are authorized and secure.
General Guidelines
- Training Requirements: Officers must understand the specific policies and procedures for their assigned institution.
- Layered Protection: Multiple layers of security devices (and locking mechanisms involving Folger-Adams keys) are implemented to prevent escapes and control access.
- Questioning/Verification: Always check the authorization of people accessing tools or security items.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.