Security Classification Matching Quiz
88 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Match the following items to their potential risks in an institution:

Keys = Access to restricted areas Acetylene cutting torches = Escape attempts Cellular phones = Illicit drug trafficking Hobby craft tools = Injury potential

Match the following policy documents with their descriptions:

Commissioner’s Directive 573 = General guidelines for item control Institutional Standing Orders = Specific directions for each institution Post Orders = Detailed instructions regarding operations Policy documents = Frameworks for security measures

Match the following items with their categories under CD 573:

Keys = Critical items for security Communication equipment = Tools for safety coordination Dangerous Substances = Items posing safety risks Contractor tools = Equipment used by external workers

Match the following reasons for control with their corresponding implications:

<p>Misuse of tools = Threat to security Unauthorized access = Risk to offenders' safety Inadequate control measures = Increased escape attempts Access to dangerous items = Potential harm to staff and public</p> Signup and view all the answers

Match the following tools with their usage in daily operations:

<p>Ladders = Accessing high areas Hacksaw blades = Cutting materials Tools = Operational necessities Communication equipment = Facilitating contact</p> Signup and view all the answers

Match the following dangers with their relevant items:

<p>Propane = Flammable substance Bolt cutters = Escape devices Cellular phones = Means for communication Craft tools = Hobby-related risks</p> Signup and view all the answers

Match the following key aspects with their corresponding directives:

<p>Security classification = Influences Standing Orders Fundamental principles = Reflected in all policy documents Operational risk = Justifies strict controls Institutional layout = Affects control measures</p> Signup and view all the answers

Match the following items to their definitions as critical items:

<p>Keys = Facilitate access control Tools = Items for operational tasks Dangerous substances = Materials that pose hazards Communication devices = Essential for coordination</p> Signup and view all the answers

Match the following classes of keys with their descriptions:

<p>Prohibited (class P) = Keys that can seriously compromise safety if misused Restricted (class R) = Keys used by staff for control within the institution Non-restricted (class N) = Keys for daily operational needs with negligible misuse consequences All classes = Established control procedures must be followed</p> Signup and view all the answers

Match the following types of keys with their examples:

<p>Folger Adams Key = Cell doors and armed control post doors Best Key = Padlocks on filing cabinets or storage lockers Proximity Card = Access control using an embedded microchip General Key = Used for opening workshop cupboards without critical contents</p> Signup and view all the answers

Match the following security classifications with their characteristics:

<p>Maximum Security = Requires the highest level of control and supervision Medium Security = Compromises safety depending on key control Minimum Security = Allows for a more lenient access to keys Multi-level Security = Combines different levels of security measures</p> Signup and view all the answers

Match the following key classes with their handling rules:

<p>Prohibited Keys = Extra control procedures for handling required Restricted Keys = Normal control procedures must be followed Non-restricted Keys = Can be accessed by both staff and offenders All key classes = Should never be possessed by offenders</p> Signup and view all the answers

Match the following terms related to security to their definitions:

<p>Proximity Card = An electronic key for controlled access Key Safe = Locked storage for keys Critical Areas = Locations requiring high-security measures Card Reader = Device that verifies access permissions</p> Signup and view all the answers

Match the following keys with their corresponding usage details:

<p>Prohibited (class P) = Used for access to armories and critical areas Restricted (class R) = Used by staff for cell and movement control Non-restricted (class N) = Used for accessing low-risk areas like lockers Folger Adams Key = Difficult to pick and duplicate keys</p> Signup and view all the answers

Match the following items with their purposes:

<p>Exterior Doors = Access restricted by Prohibited keys Internal Control Posts = Access restricted by Restricted keys Accommodation Rooms = May use Non-restricted keys Locking Devices = Secure access control using various keys</p> Signup and view all the answers

Match the following control measures with their importance:

<p>Extra Control Procedures = Needed for handling Prohibited Keys Normal Control Procedures = Required for Restricted Keys Low Control Procedures = Applicable for Non-restricted Keys Immediate Access = Requires override in emergencies</p> Signup and view all the answers

Match the type of area with its key requirements:

<p>Critical Areas = Need Prohibited or Restricted keys Sensitive Areas = Secured with Best locking devices Operational Areas = Accessed with Non-restricted keys General Access = Allowed with Proximity Cards</p> Signup and view all the answers

Match the following key characteristics with their descriptions:

<p>Prohibited Keys = Critical for institutional safety Restricted Keys = Used by authorized staff only Non-restricted Keys = Commonly managed by offenders Proximity Card = Access determined by internal programming</p> Signup and view all the answers

Match the following key types with their security features:

<p>Folger Adams Key = More difficult to duplicate Best Key = Second layer of protection Proximity Card = Allows monitoring of access history Standard Key = Used for non-critical operations</p> Signup and view all the answers

Match the following roles with their responsibilities:

<p>Staff = Must adhere to key control procedures Offenders = Limited access to certain keys Security Maintenance Officer = Keeps a master inventory of keys Institution Manager = Imposes key control regulations</p> Signup and view all the answers

Match the following key usage scenarios with their classification:

<p>Access to Armory = Classified as Prohibited Key for Accommodation Room = Classified as Non-restricted Managing Fire Doors = Classified as Restricted Locking Workshop Cupboards = Classified as Non-restricted</p> Signup and view all the answers

Match the following types of keys with their specific risk levels:

<p>Prohibited Keys = Highest risk if compromised Restricted Keys = Serious consequences if misused Non-restricted Keys = Negligible risk involved Best Keys = Low risk but still monitored</p> Signup and view all the answers

Match the classes of tools with their descriptions:

<p>Non-restricted (class N) = Tools generally considered safe for offenders to use without supervision Restricted (class R) = Tools that could potentially be misused for escapes or weapons under supervision Prohibited (class P) = Extremely dangerous tools that offenders cannot use without staff supervision General Purpose = Tools used in various maintenance tasks in institutional facilities</p> Signup and view all the answers

Match the tool with its classification:

<p>Wood saw = Non-restricted (class N) Hammer = Restricted (class R) Knife = Prohibited (class P) Socket wrench = Non-restricted (class N)</p> Signup and view all the answers

Match the immediate action with its corresponding situation when a key or proximity card is lost:

<p>Report to Correctional Manager = After confirming the item cannot be found Verify placement on the wrong peg = Upon suspicion of loss Complete Missing Tool Report = After reporting the loss Check with fellow staff members = Immediately after suspecting loss</p> Signup and view all the answers

Match the tool type with its usage:

<p>Acetylene cutting torch = Considered prohibited due to danger Soldering iron = Non-restricted for maintenance tasks Hacksaw blades = Restricted and requires supervision Nail gun = Considered a dangerous tool typically unauthorized for offenders</p> Signup and view all the answers

Match the type of security measure with its relevant tool class:

<p>Color coded yellow = Non-restricted (class N) Direct supervision required = Restricted (class R) Never issued to offenders = Prohibited (class P) Used unsupervised in kitchens = Prohibited with restrictions</p> Signup and view all the answers

Match the action to its category during a security check:

<p>Routine door security checks = Essential for maintaining facility safety Checking tool color codes = Staff responsibility for safe issuance Immediate tool reporting = Action after noticing a loss Staff training on tool classes = Critical for ensuring proper supervision</p> Signup and view all the answers

Match the following tools with their security classification color code:

<p>Pliers = Blue (Restricted) Tape measure = Yellow (Non-restricted) Knives in kitchen = Red (Prohibited, under specific use) Sledgehammer = Blue (Restricted)</p> Signup and view all the answers

Match the scenario with the necessary follow-up action:

<p>Key falls into the wrong place = Verify placement immediately Loss of a provisional card = Report to the Correctional Manager Tool suspected missing = Conduct a quick search Prohibited tool found = Complete an incident report</p> Signup and view all the answers

Match the types of threats posed by tools to their descriptions:

<p>Escape tools = Used to facilitate offender escapes Weaponized tools = Possibility of fashioning into a weapon Construction tools = May be misused if not monitored General maintenance tools = Essential for daily operations but monitored</p> Signup and view all the answers

Match the type of offender tool use with its context:

<p>Unsupervised knife use in kitchens = Specific exception in some institutions Daily checks of locking mechanisms = Routine security measure Tools in carpentry shops = Legitimate use under supervision Emergency tool reporting = Critical upon loss confirmation</p> Signup and view all the answers

Match the security classification with its potential risk:

<p>Prohibited tools = Highly dangerous and strictly monitored Restricted tools = Possible misuse but allowed under supervision Non-restricted tools = Considered generally safe for use Contractor tools = Potentially dangerous if not monitored</p> Signup and view all the answers

Match the item with its operational relevance:

<p>Missing Tool Report = Document outlining loss circumstances Correctional Manager roles = In charge of shift security Regular checks = Preventive measure against security breaches Staff supervision of restricted tools = Ensure safety during use</p> Signup and view all the answers

Match the key and tool control terminology with their correct descriptions:

<p>Key Ring = Secures multiple keys for a specific operational area Key Tag System = Allows staff to borrow keys using personal identifiers Emergency Keys = Keys required for quick access during emergencies Key Issue Register = Records details of keys issued and returned</p> Signup and view all the answers

Match the type of key safe with its primary function:

<p>Operational Area Key Safe = Holds keys specific to a certain operational area Duty Office Key Safe = Stores emergency and backup operational keys Main Gate Key Safe = Serves non-staffed operational areas' key storage Electronic Key Safe = Requires a PIN for electronic access</p> Signup and view all the answers

Match the key control terms with their roles:

<p>Security Maintenance Officer (SMO) = Maintains the Key Registry Key Registry = Lists all keys and their locations Key Safe = Secure storage for key rings and keys Key Tag = Identifies staff members' key borrowing</p> Signup and view all the answers

Match the situation with the appropriate key control measure:

<p>Lost key situation = Use Key Issue Register Daily shift end = Return keys to the operational key safe Emergency response = Use Emergency Keys Key borrowing = Use Key Tag System</p> Signup and view all the answers

Match the function with the correct term:

<p>Locking mechanism access = Emergency Keys Physical key identification = Key Tag Key borrowing record = Key Issue Register Stored location for keys = Key Safe</p> Signup and view all the answers

Match the base materials with their key control applications:

<p>Metal Key Ring = Groups keys together Clear Pouch = Stores emergency keys for visibility Electronic Box = Secure electronic access to keys Written Inventory = Lists contents of a key safe</p> Signup and view all the answers

Match the terminology with relevant operational context:

<p>Key Ring = Operational area keys grouped together Emergency Keys = Rapid access during incidents Main Gate Key Safe = Returns keys from non-staffed areas Key Tag System = Measures key borrowing for accountability</p> Signup and view all the answers

Match the description with the type of key safe:

<p>Duty Office Key Safe = Stores operational area and emergency keys Operational Area Key Safe = Houses keys for specific operational needs Main Gate Key Safe = Central storage for all non-staffed areas Electronic Key Safe = Access via keypad and PIN</p> Signup and view all the answers

Match the process with the correct key terminology:

<p>Issuing keys = Key Issue Register Identifying personal keys = Key Tag System Storing keys securely = Key Safe Tracking key usage = Key Registry</p> Signup and view all the answers

Match each key element with its importance:

<p>Emergency Keys = Ensuring quick access under pressure Key Tag System = Identifying staff possession of keys Key Safe = Providing a secure storage solution Key Registry = Recording key movements</p> Signup and view all the answers

Match the type of key storage with the appropriate need:

<p>Key Registry = Maintaining unique identifiers for keys Key Safe = Securing multiple key rings Emergency Keys = Assuring rapid access in crisis Main Gate Key Safe = Returning keys after shifts</p> Signup and view all the answers

Match the key management term with its description:

<p>Key Safe = Storage device for grouped keys Key Tag = Allows accountability in key borrowing Emergency Keys = Designated for urgent access during crises Key Issue Register = Logs detailed history of key transactions</p> Signup and view all the answers

Match the key storage type with its specific characteristic:

<p>Electronic Key Safe = Locks/unlocks via PIN Operational Area Key Safe = Key storage within operational zones Main Gate Key Safe = Accessed outside of operational hours Duty Office Key Safe = Houses emergency access keys</p> Signup and view all the answers

Match the control measure with the scenario it addresses:

<p>Emergency Keys = Needed during a riot or fire Key Issue Register = When borrowing keys long-term Key Tag System = Managing daily key access for staff Operational Area Key Safe = Daily shift key storage and management</p> Signup and view all the answers

Match the concept with its utility in key management:

<p>Key Registry = Informs about key location and identifiers Key Safe = Provides a physical secure storage place Emergency Keys = Are specially designated for urgent access Key Tag System = Enables quick identification of key holders</p> Signup and view all the answers

Match the type of lock with its description:

<p>Single Lock = Key used to roll the tumbler once; free-floating plunger. Double Lock = Key used to roll the tumbler twice; fixed plunger. Folger-Adams Key = Key used to access secure control posts. Best Lock = Locking device used for individual offices.</p> Signup and view all the answers

Match the following security layers with their purpose:

<p>Static Security Devices = Provide stationary layers of protection. Dynamic Security Skills = Utilize officer skills for protection. Key Safe = Store non-essential keys securely. Key Control Procedures = Guidelines to manage keys effectively.</p> Signup and view all the answers

Match the key control procedures with their importance:

<p>Verify keys at shift change = Ensures all keys are accounted for. Immediate reporting of missing keys = Prevents unauthorized access. Pat-down before leaving site = Ensures no keys are taken unintentionally. Authorized issuing of keys = Prevents key misuse by offenders.</p> Signup and view all the answers

Match the type of institution with its security characteristics:

<p>Maximum Security = Most layers of protection used. Medium Security = Some static barriers, fewer layers. Minimum Security = Minimal layers of protection. Restricted Movement Unit = Access is tightly controlled.</p> Signup and view all the answers

Match the item with its locking necessity:

<p>Filing Cabinet = Protected by a locking bar and padlock. Department Area Door = Secured by a Folger-Adams key. Emergency Keys = Identified by specific marks. Locking Device = Managed through key inventory documents.</p> Signup and view all the answers

Match the following dangerous substances with their corresponding hazards:

<p>Solvent soaked rags = Fire hazard when left unsecured Gasoline in a container = Risk of explosion when unsecured Hollow frame hacksaw = Potential for hidden blades Unauthorized tools = Security risk for institution</p> Signup and view all the answers

Match the security risks with their control measures:

<p>Offender Escapes = Using layered security devices. Unauthorized Access = Vigilance in key control. Tampering with Locks = Reports to officers in charge. Key Misuse = Strict issuing procedures.</p> Signup and view all the answers

Match the following tool control activities with their purposes:

<p>Verify authorized tools = Ensure compliance with Tool Registry Check locking tool boxes = Secure tools not in immediate use Account for tools before departure = Prevent loss of contractor tools Confirm no cellular phones = Maintain communication protocol</p> Signup and view all the answers

Match the electronic key control features with their functions:

<p>Master panel = Visual status of doors and barriers Manual key system = Backup method for malfunction Electronic keys = Control main barriers electronically Electric failure alerts = Notify staff of potential issues</p> Signup and view all the answers

Match the key control task with its action:

<p>Record key verification = Post logbook entries. Questioning key access = Communication skills assessment. Learning emergency keys = Identification by location or color. Immediate reporting = Notify officer in charge.</p> Signup and view all the answers

Match the term with its definition:

<p>Key Safe = Container for storing keys. Plunger in Lock = Barrier that secures the locking mechanism. Tumbler = Component rolled by the key to unlock. Locking Device = Mechanism requiring a key or electronic control.</p> Signup and view all the answers

Match the following scenarios with the appropriate cautionary advice:

<p>New correctional officer with ladder = Check colour coding and tool classifications Contractor with hacksaw = Inquire about spare blades in tools Hollow tool misuse = Ensure all potential risks are communicated Entering through a proximity card = Be vigilant of following others</p> Signup and view all the answers

Match the operational procedure with its purpose:

<p>Initial key check = Ensures all keys are ready for operation. Key inventory check = Confirms keys’ locations. Tampered locks report = Informs about potential security breaches. Key handover = Ensures keys stay with authorized personnel.</p> Signup and view all the answers

Match the following procedures regarding outside contractors with their descriptions:

<p>Pre-authorization of tools = Required before contractor arrival Tool Registry form = Documents authorized tools Written procedure information = Outlines tool control protocols Unauthorized tool removal = Must be secured by officers</p> Signup and view all the answers

Match the following tool inspection tasks with their importance:

<p>Checking contractor vehicle = Prevents entry of dangerous items Securing unauthorized tools = Limits security risks Verifying tool accountability = Aids in loss prevention Inspecting communication devices = Ensures prohibited items are not present</p> Signup and view all the answers

Match the term with its related action:

<p>Key Issue Registry = Document for tracking key issuances. Vigilance in monitoring = Observing suspicious key access. Malfunctioning lock report = Notify control officials immediately. Emergency key retrieval = Selecting keys by identifying features.</p> Signup and view all the answers

Match the security principle with its application:

<p>Layered Protection = Utilizing multiple static barriers. Static Security = Fixed measures against breaches. Key Control = Robust management of key usage. Dynamic Security = Reactivity of staff in the situation.</p> Signup and view all the answers

Match the electronic locking device components with their roles:

<p>Toggles and switches = Control access electronically Secure control posts = House electronic key systems Visual alerts from master panel = Monitor door status Backup manual keys = Open in case of power failure</p> Signup and view all the answers

Match the type of key with its usage context:

<p>Emergency Key = Used in crisis situations. Prohibited Key = Restricted access for offenders. Control Post Key = Access for secure areas. Regular Key = Used for everyday operations.</p> Signup and view all the answers

Match the following construction scenarios with their outcomes:

<p>Improper storage of gasoline = Potential fire hazard Open access to off-site tools = Increased risk of theft Unauthorized tool presence = Violation of security protocols Inadequate communication monitoring = Safety breaches during active work</p> Signup and view all the answers

Match the following contractor responsibilities with their corresponding rules:

<p>Use of secured tool boxes = Prevents unauthorized access Monitoring tool usage during work = Ensures compliance with procedures Reporting lost tools = Informs authority of security breaches Adhering to communication protocols = Safeguards institutional integrity</p> Signup and view all the answers

Match the key control protocol with its requirement:

<p>Pat-down protocol = Prevent unauthorized key removal. Key verification = Ensures accountability at shifts. Report missing keys = Prompt action to prevent issues. Authorized handling = No offender access to restricted keys.</p> Signup and view all the answers

Match the security area with its necessary actions:

<p>Institution Entrance = Report any key breaches. Key Safe Area = Verify key presence regularly. Control Room = Maintain enhanced monitoring. Locked Offices = Ensure all locks are secured.</p> Signup and view all the answers

Match the following color coding of tools with their significance:

<p>Yellow ladders = Workplace safety requirement Red tools = Prohibited items Green tools = Approved for unrestricted use Blue tools = Contact tools for special tasks</p> Signup and view all the answers

Match the key control responsibility with its expected behavior:

<p>Stay vigilant = Monitor access attempts. Record keeping = Maintain an accurate key log. Notify about issues = Immediate reporting to authorities. Proper handling = Avoid throwing or mishandling keys.</p> Signup and view all the answers

Match the storage method with its description:

<p>Shadow Boards = Identify if a tool is missing Tool Room (Crib) = Storage restricted from offender access Secure Storage = Prohibited tools stored in a secure area Tool Boxes/Cabinets = Used when other storage methods are not applicable</p> Signup and view all the answers

Match the tool class with its category:

<p>Class R = Restricted tools Class P = Prohibited tools Class N = Non-restricted tools Shadowed tools = Identifying missing tools</p> Signup and view all the answers

Match the action with when to perform it:

<p>Report any missing tool = Immediately after discovering the loss Complete a Missing Tool Report = After notifying the manager Check authorization of tools = Before allowing offenders to use tools Validate hobby craft tools = During routine cell searches</p> Signup and view all the answers

Match the procedure with its requirement:

<p>Using shadow boards = To help identify missing tools Daily tool accounting = To maintain accurate inventory Prohibiting offenders from tools = To enhance security Regular policy review = To ensure compliance with tool control procedures</p> Signup and view all the answers

Match the following tools with their risk:

<p>Hobby craft tools = Could be misused as weapons Chemical substances = Present security dangers Power tools = Require supervision for offenders Non-restricted tools = Can be issued daily when needed</p> Signup and view all the answers

Match the hobby craft tools with their application:

<p>Leather work tools = Authorized for use by specific offenders Scissors = Require control procedures Painting supplies = Must be displayed on a permit Wood carving tools = Used in designated areas only</p> Signup and view all the answers

Match the item with its storage condition:

<p>Prohibited tools = Stored in a secure area Restricted tools = Stored in a tool room Shadow boards = Used for tool identification Individual tool kits = Issued based on daily demand</p> Signup and view all the answers

Match the authority with their responsibility:

<p>Institutional head = Authorizes hobby craft tools Correctional Manager = Notifies others when tools are missing Staff member = Oversees tool usage by offenders Volunteer = Requires authorization for tool entry</p> Signup and view all the answers

Match the color code with its associated tool status:

<p>Red color code = Prohibited tools Blue color code = Restricted tools Light green background = Shadow board color No color code = Non-restricted tools</p> Signup and view all the answers

Match the tool procedure with its guideline:

<p>Do not loan tools = To unauthorized offenders Report discrepancies = Immediately at the entrance Use inventory forms = To account for tools being brought in Keep tools secured = During contractor visits</p> Signup and view all the answers

Match the type of tool with its registration requirement:

<p>Hobby craft tools = Must have a permit displayed Contractor tools = Must be inventoried on Tool Register Restricted tools = Required to be stored in a crib Prohibited tools = Must not be in possession by offenders</p> Signup and view all the answers

Match the tool usage guideline with the timing:

<p>Check authorization = Before offender uses a tool Conduct cell searches = To verify tool presence Look for left tools = While moving about the institution Complete tool inventory = At the start of each shift</p> Signup and view all the answers

Match the incident with its potential response:

<p>Tool found in unauthorized area = Seize and report to authority Offender with unauthorized tool = Verify and take necessary action Missing tool incident = Complete a report Contractor present = Monitor tools and offenders closely</p> Signup and view all the answers

Match the following risks with their control measures:

<p>Unauthorized tool possession = Supervision by staff required Chemical substance misuse = Restricted access Hobby craft tools as weapons = Specific control procedures apply Leaving tools unattended = Regularly check sites</p> Signup and view all the answers

Flashcards

What is Commissioner's Directive 573?

Directive 573 outlines the general guidelines for controlling items critical to the security and safety of a correctional institution. It covers items like keys, tools, dangerous substances and communication equipment.

What are 'items critical to the security and safety of the institution'?

Items that are controlled by Commissioner's Directive 573 due to their potential for security risks and safety threats within the institution.

Explain Institutional Standing Orders.

Each correctional facility has its own set of rules about how to control critical items, which are more specific than Directive 573.

What are Post Orders?

The most specific set of rules and guidelines for controlling critical items within a correctional facility. These are tailored to the specific location and security measures.

Signup and view all the flashcards

Why is access to Restricted Movement area keys a major concern?

Offenders gaining access to restricted areas could lead to harm for inmates requiring protection and threaten the overall security of the institution.

Signup and view all the flashcards

Why is controlling access to tools like cutting torches and ladders important in prisons?

Tools like cutting torches, ladders, and bolt cutters might be used by offenders to escape, posing a threat to the safety of both the institution and the public.

Signup and view all the flashcards

Explain the risk of inmates having access to cell phones?

Access to cell phones can be used by inmates to facilitate illegal activities such as drug trafficking, jeopardizing the safety and security of the institution.

Signup and view all the flashcards

Why is the control of critical items so crucial?

The control of critical items is essential to maintain the security and safety of the institution, its inmates, staff, and the public.

Signup and view all the flashcards

Prohibited Keys (Class P)

These keys are crucial for the institution's safety and security. Losing them to outsiders could have severe consequences like compromising security and endangering staff, offenders, and the public.

Signup and view all the flashcards

Restricted Keys (Class R)

These keys are used by staff to maintain control within the institution. Their misuse could lead to security compromises and endangerment of staff, offenders, and the public.

Signup and view all the flashcards

Non-restricted Keys (Class N)

These keys are used for various daily operational needs. Their misuse by offenders has minimal consequences.

Signup and view all the flashcards

Folger Adams Key

This type of key is designed to be difficult to duplicate and pick, making it ideal for locking critical areas in the institution.

Signup and view all the flashcards

Best Key

Locking devices with 'Best' keys are used for sensitive areas or equipment, providing an extra layer of protection.

Signup and view all the flashcards

Proximity Card

A plastic card with a microchip that identifies the cardholder and the locking devices they are authorized to access.

Signup and view all the flashcards

Proximity Card for Offenders

Offenders are also issued proximity cards, but their functionality is restricted, allowing access only to specific areas like their accommodation buildings.

Signup and view all the flashcards

Manual Override for Proximity Cards

Locking devices that use proximity cards can be opened manually with a key in case of a major power failure.

Signup and view all the flashcards

Electronic Override for Proximity Cards

The system can be over-ridden electronically for rapid access in emergency situations such as lockdowns or fire.

Signup and view all the flashcards

Key Inventory Management

The Security Maintenance Officer is responsible for maintaining a complete record of all keys within the institution.

Signup and view all the flashcards

Security Classification and Control

The security level of an institution determines the level of control and supervision necessary. Higher security levels require more stringent measures.

Signup and view all the flashcards

Variations in Control Procedures

Institutions have different control procedures for keys and other items based on their security level. The higher the level, the more critical control becomes.

Signup and view all the flashcards

Prohibition of Personal Cell Phones

Staff are not permitted to bring personal cell phones into the institution. Cell phones are prohibited due to security concerns and communication protocols.

Signup and view all the flashcards

Institutional Variations in Control Measures

All institutions do not have the same control procedures for items like keys and cell phones.

Signup and view all the flashcards

What is a key ring?

A metal ring used to group keys together for a specific operational area.

Signup and view all the flashcards

What is a key ring tag?

A numbered tag attached to a key ring, identifying the keys and their specific operational area.

Signup and view all the flashcards

What is a Key Registry?

A written record maintained by the Security Maintenance Officer (SMO) that lists all keys, their identifiers, and the locking devices they operate.

Signup and view all the flashcards

What are key tags?

Tags assigned to staff members, inscribed with their unique numbers or identifiers, used to track key borrowing.

Signup and view all the flashcards

How does the key tag system work?

A visual and physical system that uses key tags to control key issuance and ensure accountability.

Signup and view all the flashcards

What are emergency keys?

Keys designated for rapid access during emergencies, such as fires, riots, or escapes.

Signup and view all the flashcards

What is a key safe?

A secure metal box, often locked with a key, used to store keys for specific operational areas.

Signup and view all the flashcards

What is an operational area key safe?

A key safe located in each major operational area within the institution, containing keys specific to that location.

Signup and view all the flashcards

What is a duty office key safe?

This key safe, located in the main duty office, stores emergency keys, armoury keys, fire walk keys, and back-up vehicle keys.

Signup and view all the flashcards

What is a main gate key safe?

A larger key safe often located at the main gate, used to store keys for operational areas not staffed 24/7.

Signup and view all the flashcards

What is a key issue register?

A written log used to record the time, date, person receiving the key, key description, and signatures for issuance and return.

Signup and view all the flashcards

What are Commissioner's Directives?

A specific directive outlining the general guidelines for controlling critical items, such as keys, tools, and communication devices.

Signup and view all the flashcards

What are Institutional Standing Orders?

These are rules specific to each correctional facility that outline how to control critical items in a particular setting.

Signup and view all the flashcards

Why is controlling access to restricted movement area keys a major concern?

Offenders gaining access to restricted areas could lead to harm for inmates requiring protection and threaten the overall security of the institution.

Signup and view all the flashcards

Why is controlling tools like cutting torches and ladders important in prisons?

These tools could be used by offenders to escape or create disturbances, posing a threat to safety.

Signup and view all the flashcards

What is a Double Lock?

A locking device where the tumbler is rolled twice, making the plunger locked and unable to move. The door can't be opened or closed without a key.

Signup and view all the flashcards

What is a Folger-Adams Key?

A key with a specific cut and groove that is unique to each locking device. Each key is assigned to a specific area or purpose.

Signup and view all the flashcards

What is Layered Protection?

A system of multiple security measures, like locks and barriers, designed to prevent unauthorized access. Each layer increases difficulty for potential threats.

Signup and view all the flashcards

What is Key Verification?

The process of confirming every key assigned to a specific area, both the physical presence and location within the key safe, at the start and end of a shift.

Signup and view all the flashcards

What is a 'Pat-Down'?

An immediate self-check to ensure no unauthorized keys are being taken off-duty. This practice helps uphold key control and security.

Signup and view all the flashcards

What is an Emergency Key?

A key assigned for urgent or emergency situations allowing immediate access to specific areas or locking devices.

Signup and view all the flashcards

What is a Key Tag System?

A system that uses tags attached to keys to identify and track their location and restrictions.

Signup and view all the flashcards

What is Key Vigilance?

The act of being aware of who is attempting to access a specific locking device and verifying their authorization before allowing access.

Signup and view all the flashcards

What is a Tampered Locking Device?

An incident in which a locking device has been altered or damaged, potentially compromising security. This must be reported promptly.

Signup and view all the flashcards

What is an SOR (Security Observation Report)?

A detailed report filed about security incidents, including details about a tampered locking device. This document provides evidence and documentation of the issue.

Signup and view all the flashcards

What is a Restricted Movement Unit (RMU)?

A designated area within an institution that requires heightened security measures, typically housing inmates with special security needs.

Signup and view all the flashcards

What is Proximity Card Access?

A system that uses electronic cards to control access to specific areas, often used to enhance security measures within an institution.

Signup and view all the flashcards

Dangerous Substance

Any substance that, if not stored and disposed of properly, could pose a fire hazard.

Signup and view all the flashcards

CO-PW's Role in Dangerous Substance Control

CO-PWs play a vital role in ensuring dangerous substances are stored and used appropriately, keeping track of their location, users, and intended purpose.

Signup and view all the flashcards

Contractor Tools & Security Risk

Outside contractors require various tools for their work. These tools, if misused, pose a security risk for the institution and endanger staff, offenders, and the public.

Signup and view all the flashcards

Tool Registry for Contractors

Before entering the institution, every contractor's tools are authorized and documented on a Tool Registry form to restrict unauthorized items.

Signup and view all the flashcards

Contractor Vehicle Search by CO-PWs

A thorough search is conducted by CO-PWs to check the contractor's vehicle for any non-authorized tools or dangerous substances that are not on the Tool Registry.

Signup and view all the flashcards

Verification of Tools Upon Contractor Departure

CO-PWs are tasked with verifying the presence of all tools listed on the Tool Registry before the contractor leaves the institution.

Signup and view all the flashcards

Locking Toolboxes for Secure Storage

Locking toolboxes are required to secure contractor's tools not immediately needed on the job site.

Signup and view all the flashcards

Prohibition of Cellular Phones for Contractors

Cellular phones are strictly prohibited for contractors entering the institution to prevent communication with potential offenders.

Signup and view all the flashcards

Electronic Keys for Access Control

Electronic keys, such as toggles and switches, are used to control access to specific doors and barriers within the institution.

Signup and view all the flashcards

Manual Keys as Backup

A manual key system serves as a backup for the electronic key system in case of power failure or malfunction.

Signup and view all the flashcards

Master Panel for Door Status

A master panel provides visual information about the status of each door or barrier controlled by electronic keys.

Signup and view all the flashcards

CO-PW's Role in Contractor Tool Control

The CO-PW plays a critical role in ensuring tool control for contractors by initially searching contractor vehicles and escorting them to their worksite.

Signup and view all the flashcards

Hacksaw Blade Incident

An example where a contractor's hacksaw contained concealed extra blades highlighting the need for thorough inspection of contractor tools.

Signup and view all the flashcards

Defeating Proximity Cards

Staff should be aware of the possibility of offenders attempting to gain unauthorized access by following someone with a proximity card.

Signup and view all the flashcards

Routine lock checks

The process of verifying the security of all locks and locking mechanisms throughout a correctional facility, including doors, gates, and windows. This is done by physically checking them to ensure they are functioning properly.

Signup and view all the flashcards

What are 'critical items'?

Keys, cards, or other devices which can control access to restricted areas or critical resources in a correctional facility.

Signup and view all the flashcards

What is a 'key loss procedure'?

A set of procedures that outline the specific steps for dealing with a lost key or proximity card within a correctional facility. This involves reporting the loss, verifying records, and launching a search.

Signup and view all the flashcards

Tools in a Correctional Facility

Tools that are considered essential for the everyday operation and upkeep of a correctional facility, but also have the risk of being misused for escape attempts or weapon construction.

Signup and view all the flashcards

What are the 'Tool Classes'?

A classification system for tools used within a correctional facility. This system categorizes tools based on their potential risk of misuse by offenders.

Signup and view all the flashcards

What are 'Non-restricted tools'?

Tools that are deemed safe for offenders to use without direct supervision. They are often marked with a yellow color code and are usually used in routine tasks.

Signup and view all the flashcards

What are 'Restricted tools'?

Tools that are considered to have a higher risk of being used for escape attempts or weapon construction. They are often marked with a blue color code and are only allowed to be used by offenders under the direct supervision of staff.

Signup and view all the flashcards

What are 'Prohibited tools'?

Tools that are deemed particularly dangerous in the hands of offenders. They are often marked with a red color code and are never issued to offenders. They are only used by staff under direct supervision.

Signup and view all the flashcards

What are 'Kitchen Knives'?

A specific type of prohibited tool used by inmates for the preparation and cooking of their meals. These knives are often secured to a knife safe or a metal counter.

Signup and view all the flashcards

What is 'key accountability'?

The act of physically securing a key or proximity card to a designated location, often within a locked safe or a specific area. This process is crucial for maintaining accountability of critical items.

Signup and view all the flashcards

What is a 'key search'?

The act of physically searching for a lost key or proximity card. This search is usually conducted by staff members in the area where the loss occurred.

Signup and view all the flashcards

What is a 'Missing Tool Report'?

A formal report that documents the circumstances of a lost key or proximity card, providing key details about the incident for investigation and future prevention.

Signup and view all the flashcards

What is a 'Restricted Movement Area'?

Areas within a correctional facility that are considered to be high security, usually because they house particularly high-risk offenders. Access to these areas is strictly controlled.

Signup and view all the flashcards

What is 'Communication Equipment'?

A critical item that allows access to different communication technologies, which can pose a security risk if misused by offenders. This is particularly relevant in the context of contraband and illegal activities.

Signup and view all the flashcards

What is 'Critical Item Control'?

A crucial aspect of maintaining security within a correctional facility. It involves the systematic control and management of all vital items to prevent unauthorized access or misuse.

Signup and view all the flashcards

What is the color scheme for Shadow Boards?

Shadow boards should be painted light green, with restricted tools marked in blue. This helps staff quickly see if a tool is missing.

Signup and view all the flashcards

Where are Prohibited tools stored?

Prohibited tools, marked in red, are stored in secure areas inaccessible to offenders. This ensures dangerous tools don't fall into wrong hands.

Signup and view all the flashcards

How are Non-Restricted tools managed?

Non-restricted tools, marked in non-color or a different color, can be issued daily as kits for specific tasks. This allows for flexibility in work projects.

Signup and view all the flashcards

What's the alternative storage method for tools?

If secure storage isn't possible, a tool box or cabinet with a padlock and inventory list is used. The key point is to prevent unauthorized access.

Signup and view all the flashcards

What's the daily routine for tool control?

It's a crucial practice to daily account for all tools. This means checking if anything is missing and investigating any discrepancies.

Signup and view all the flashcards

Who can possess Restricted or Prohibited tools?

Offenders should never possess Restricted or Prohibited tools unless directly supervised by a staff member. This prevents potential misuse or escape attempts.

Signup and view all the flashcards

What should you do if you find tools left unattended?

If you see tools left unattended, report it to the right authority. This prevents unauthorized access and ensures safety.

Signup and view all the flashcards

How do you handle tools when working with contractors?

When escorting contractors, ensure their tools are secure and locked. This prevents any unwanted or unauthorized use by offenders.

Signup and view all the flashcards

What should you do if unsure about an offender's tool authorization?

If unsure about an offender's authorization to use a tool, verify before allowing them to proceed. This ensures responsible use of tools.

Signup and view all the flashcards

What's important for maintaining good tool control?

Regularly reviewing key and tool control policies keeps everyone informed. This ensures consistent and proper practices.

Signup and view all the flashcards

Why are hobby craft tools important to control?

Hobby craft tools, while seemingly harmless, need strict control. They may be used as weapons, so proper procedures are essential.

Signup and view all the flashcards

How are hobby craft tools authorized for offenders?

Hobby craft tools must be authorized for each offender. This involves a permit displayed in their cell, preventing unauthorized use.

Signup and view all the flashcards

What's the role of cell searches regarding hobby craft tools?

Cell searches should verify that hobby craft tools are present and accounted for. This prevents unauthorized possession and ensures safety.

Signup and view all the flashcards

Can offenders share hobby craft tools?

The authorization to possess hobby craft tools is not transferable. Each offender needs their own authorization for responsible use.

Signup and view all the flashcards

Where can offenders use hobby craft tools?

Hobby craft tools can only be used in an offender's cell or other authorized areas. This prevents misuse and unauthorized possession.

Signup and view all the flashcards

Study Notes

Key and Tool Control Policy

  • Commissioner's Directive 573 (1992-11-01): Establishes guidelines for controlling items critical to institution safety and security, including keys, tools, hobby craft tools, communication equipment, dangerous substances (gasoline, propane, solvents), and contractor tools/equipment/keys.
  • Officer Responsibility: Understanding and adhering to policies outlined in Commissioner's Directive 573, Institutional Standing Orders, and Post Orders.
  • Institutional Standing Orders: Provide more specific directions tailored to each institution's security classification, facility structure, and layout.
  • Post Orders: Provide even more specific directions for each post.
  • Why Control is Important: Uncontrolled access to keys and tools allows for misuse, posing a threat to institutional security, safety for staff, offenders, and the public. Examples include potential escape attempts, unauthorized access to restricted areas, and facilitation of illicit activities.
  • Security Classification: Risk and control measures vary based on institutional security classification (maximum, medium, minimum, multi-level). Higher classifications necessitate stricter control.

Key Control

  • Key Classes: Keys are categorized for varying levels of risk:
    • Prohibited (P): Critically important to safety and security, e.g., armory, armed/central control posts, communication control, and electronic security equipment areas (needs extra handling and storage procedures).
    • Restricted (R): Security keys for custody and control within the institution (e.g., cell doors, movement barriers, fire doors, internal control posts, key safes, shop doors), also needs standard handling procedures but less strict than prohibited.
    • Non-Restricted (N): Keys for daily operational needs with negligible misuse risk (e.g., workshop cupboards, offender accommodation, storage lockers).
  • Key Types:
    • Folger-Adams Key: High-security locking devices for critical areas/documents/equipment. More difficult to pick and duplicate.
    • "Best" Key: For less critical areas, offering a second layer of protection; commonly used with Folger-Adams.
    • Proximity Card: Electronic key; requires a "card reader" device. Allows for tracking access. Can be manually overridden in emergencies.

Tool Control

  • Tool Classes: Tools are categorized based on risk:
    • Non-Restricted (N): Low escape/weapon risk; generally used without direct staff supervision (e.g., wood saw, socket wrench, tape measure).
    • Restricted (R): High escape/weapon risk; used by offenders under direct staff supervision (e.g., hammers, screwdrivers, hacksaw blades, pliers).
    • Prohibited (P): Extremely dangerous in offenders' hands; never issued to offenders without direct supervision (e.g., knives, acetylene cutting torches, bolt cutters).
  • Tool Storage: Methods include shadow boards (color-coded), tool cribs (restricted tools), secure storage (prohibited tools), individual tool kits, tool boxes/cabinets (with inventories).

Key and Tool Control Procedures

  • Daily Verification: Ensure all assigned keys/tools are accounted for at the start and end of each shift, checking against inventory and recording this in shift logs.
  • Key/Tool Handling: Proper handling by providing and receiving keys from authorized staff; prohibiting throwing keys.
  • Security Checks: Regularly verify for open locking mechanisms/damaged devices and report immediately.
  • Loss Reporting: Report missing keys or tools immediately to the appropriate authority.
  • Contractor Tool Control: Authorized tools/equipment/keys; inventory before and after contractor activities. Check for extra items.
  • Offender Access Restrictions: Ensure prohibited and restricted items are not accessible to offenders.

Emergency Keys

  • Quick Access during Emergencies: A limited selection of emergency keys (often in a specific location or color-coded) is for speed during crises.

Dangerous Substances Control

  • Control Necessary: Procedures exist for the acquisition, use, and storage of dangerous substances like gasoline, propane, solvents, etc., to maintain safety.
  • Officer vigilance: Officers need to be aware of locations/people handling these substances, ensuring they are used and stored appropriately.
  • Contractor Oversight: Verification tools/substances are authorized and secure.

General Guidelines

  • Training Requirements: Officers must understand the specific policies and procedures for their assigned institution.
  • Layered Protection: Multiple layers of security devices (and locking mechanisms involving Folger-Adams keys) are implemented to prevent escapes and control access.
  • Questioning/Verification: Always check the authorization of people accessing tools or security items.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your understanding by matching various security items with their descriptions, risks, and classifications. This quiz covers key aspects of security measures within institutions, focusing on policy documents, security classifications, and critical items. Enhance your knowledge of security protocols and their implications in daily operations.

More Like This

SFPC Flashcards: Classification Terms
46 questions
Network Security Classifications
10 questions

Network Security Classifications

WellReceivedSquirrel7948 avatar
WellReceivedSquirrel7948
Use Quizgecko on...
Browser
Browser