Podcast
Questions and Answers
Match the following items to their potential risks in an institution:
Match the following items to their potential risks in an institution:
Keys = Access to restricted areas Acetylene cutting torches = Escape attempts Cellular phones = Illicit drug trafficking Hobby craft tools = Injury potential
Match the following policy documents with their descriptions:
Match the following policy documents with their descriptions:
Commissioner’s Directive 573 = General guidelines for item control Institutional Standing Orders = Specific directions for each institution Post Orders = Detailed instructions regarding operations Policy documents = Frameworks for security measures
Match the following items with their categories under CD 573:
Match the following items with their categories under CD 573:
Keys = Critical items for security Communication equipment = Tools for safety coordination Dangerous Substances = Items posing safety risks Contractor tools = Equipment used by external workers
Match the following reasons for control with their corresponding implications:
Match the following reasons for control with their corresponding implications:
Signup and view all the answers
Match the following tools with their usage in daily operations:
Match the following tools with their usage in daily operations:
Signup and view all the answers
Match the following dangers with their relevant items:
Match the following dangers with their relevant items:
Signup and view all the answers
Match the following key aspects with their corresponding directives:
Match the following key aspects with their corresponding directives:
Signup and view all the answers
Match the following items to their definitions as critical items:
Match the following items to their definitions as critical items:
Signup and view all the answers
Match the following classes of keys with their descriptions:
Match the following classes of keys with their descriptions:
Signup and view all the answers
Match the following types of keys with their examples:
Match the following types of keys with their examples:
Signup and view all the answers
Match the following security classifications with their characteristics:
Match the following security classifications with their characteristics:
Signup and view all the answers
Match the following key classes with their handling rules:
Match the following key classes with their handling rules:
Signup and view all the answers
Match the following terms related to security to their definitions:
Match the following terms related to security to their definitions:
Signup and view all the answers
Match the following keys with their corresponding usage details:
Match the following keys with their corresponding usage details:
Signup and view all the answers
Match the following items with their purposes:
Match the following items with their purposes:
Signup and view all the answers
Match the following control measures with their importance:
Match the following control measures with their importance:
Signup and view all the answers
Match the type of area with its key requirements:
Match the type of area with its key requirements:
Signup and view all the answers
Match the following key characteristics with their descriptions:
Match the following key characteristics with their descriptions:
Signup and view all the answers
Match the following key types with their security features:
Match the following key types with their security features:
Signup and view all the answers
Match the following roles with their responsibilities:
Match the following roles with their responsibilities:
Signup and view all the answers
Match the following key usage scenarios with their classification:
Match the following key usage scenarios with their classification:
Signup and view all the answers
Match the following types of keys with their specific risk levels:
Match the following types of keys with their specific risk levels:
Signup and view all the answers
Match the classes of tools with their descriptions:
Match the classes of tools with their descriptions:
Signup and view all the answers
Match the tool with its classification:
Match the tool with its classification:
Signup and view all the answers
Match the immediate action with its corresponding situation when a key or proximity card is lost:
Match the immediate action with its corresponding situation when a key or proximity card is lost:
Signup and view all the answers
Match the tool type with its usage:
Match the tool type with its usage:
Signup and view all the answers
Match the type of security measure with its relevant tool class:
Match the type of security measure with its relevant tool class:
Signup and view all the answers
Match the action to its category during a security check:
Match the action to its category during a security check:
Signup and view all the answers
Match the following tools with their security classification color code:
Match the following tools with their security classification color code:
Signup and view all the answers
Match the scenario with the necessary follow-up action:
Match the scenario with the necessary follow-up action:
Signup and view all the answers
Match the types of threats posed by tools to their descriptions:
Match the types of threats posed by tools to their descriptions:
Signup and view all the answers
Match the type of offender tool use with its context:
Match the type of offender tool use with its context:
Signup and view all the answers
Match the security classification with its potential risk:
Match the security classification with its potential risk:
Signup and view all the answers
Match the item with its operational relevance:
Match the item with its operational relevance:
Signup and view all the answers
Match the key and tool control terminology with their correct descriptions:
Match the key and tool control terminology with their correct descriptions:
Signup and view all the answers
Match the type of key safe with its primary function:
Match the type of key safe with its primary function:
Signup and view all the answers
Match the key control terms with their roles:
Match the key control terms with their roles:
Signup and view all the answers
Match the situation with the appropriate key control measure:
Match the situation with the appropriate key control measure:
Signup and view all the answers
Match the function with the correct term:
Match the function with the correct term:
Signup and view all the answers
Match the base materials with their key control applications:
Match the base materials with their key control applications:
Signup and view all the answers
Match the terminology with relevant operational context:
Match the terminology with relevant operational context:
Signup and view all the answers
Match the description with the type of key safe:
Match the description with the type of key safe:
Signup and view all the answers
Match the process with the correct key terminology:
Match the process with the correct key terminology:
Signup and view all the answers
Match each key element with its importance:
Match each key element with its importance:
Signup and view all the answers
Match the type of key storage with the appropriate need:
Match the type of key storage with the appropriate need:
Signup and view all the answers
Match the key management term with its description:
Match the key management term with its description:
Signup and view all the answers
Match the key storage type with its specific characteristic:
Match the key storage type with its specific characteristic:
Signup and view all the answers
Match the control measure with the scenario it addresses:
Match the control measure with the scenario it addresses:
Signup and view all the answers
Match the concept with its utility in key management:
Match the concept with its utility in key management:
Signup and view all the answers
Match the type of lock with its description:
Match the type of lock with its description:
Signup and view all the answers
Match the following security layers with their purpose:
Match the following security layers with their purpose:
Signup and view all the answers
Match the key control procedures with their importance:
Match the key control procedures with their importance:
Signup and view all the answers
Match the type of institution with its security characteristics:
Match the type of institution with its security characteristics:
Signup and view all the answers
Match the item with its locking necessity:
Match the item with its locking necessity:
Signup and view all the answers
Match the following dangerous substances with their corresponding hazards:
Match the following dangerous substances with their corresponding hazards:
Signup and view all the answers
Match the security risks with their control measures:
Match the security risks with their control measures:
Signup and view all the answers
Match the following tool control activities with their purposes:
Match the following tool control activities with their purposes:
Signup and view all the answers
Match the electronic key control features with their functions:
Match the electronic key control features with their functions:
Signup and view all the answers
Match the key control task with its action:
Match the key control task with its action:
Signup and view all the answers
Match the term with its definition:
Match the term with its definition:
Signup and view all the answers
Match the following scenarios with the appropriate cautionary advice:
Match the following scenarios with the appropriate cautionary advice:
Signup and view all the answers
Match the operational procedure with its purpose:
Match the operational procedure with its purpose:
Signup and view all the answers
Match the following procedures regarding outside contractors with their descriptions:
Match the following procedures regarding outside contractors with their descriptions:
Signup and view all the answers
Match the following tool inspection tasks with their importance:
Match the following tool inspection tasks with their importance:
Signup and view all the answers
Match the term with its related action:
Match the term with its related action:
Signup and view all the answers
Match the security principle with its application:
Match the security principle with its application:
Signup and view all the answers
Match the electronic locking device components with their roles:
Match the electronic locking device components with their roles:
Signup and view all the answers
Match the type of key with its usage context:
Match the type of key with its usage context:
Signup and view all the answers
Match the following construction scenarios with their outcomes:
Match the following construction scenarios with their outcomes:
Signup and view all the answers
Match the following contractor responsibilities with their corresponding rules:
Match the following contractor responsibilities with their corresponding rules:
Signup and view all the answers
Match the key control protocol with its requirement:
Match the key control protocol with its requirement:
Signup and view all the answers
Match the security area with its necessary actions:
Match the security area with its necessary actions:
Signup and view all the answers
Match the following color coding of tools with their significance:
Match the following color coding of tools with their significance:
Signup and view all the answers
Match the key control responsibility with its expected behavior:
Match the key control responsibility with its expected behavior:
Signup and view all the answers
Match the storage method with its description:
Match the storage method with its description:
Signup and view all the answers
Match the tool class with its category:
Match the tool class with its category:
Signup and view all the answers
Match the action with when to perform it:
Match the action with when to perform it:
Signup and view all the answers
Match the procedure with its requirement:
Match the procedure with its requirement:
Signup and view all the answers
Match the following tools with their risk:
Match the following tools with their risk:
Signup and view all the answers
Match the hobby craft tools with their application:
Match the hobby craft tools with their application:
Signup and view all the answers
Match the item with its storage condition:
Match the item with its storage condition:
Signup and view all the answers
Match the authority with their responsibility:
Match the authority with their responsibility:
Signup and view all the answers
Match the color code with its associated tool status:
Match the color code with its associated tool status:
Signup and view all the answers
Match the tool procedure with its guideline:
Match the tool procedure with its guideline:
Signup and view all the answers
Match the type of tool with its registration requirement:
Match the type of tool with its registration requirement:
Signup and view all the answers
Match the tool usage guideline with the timing:
Match the tool usage guideline with the timing:
Signup and view all the answers
Match the incident with its potential response:
Match the incident with its potential response:
Signup and view all the answers
Match the following risks with their control measures:
Match the following risks with their control measures:
Signup and view all the answers
Study Notes
Key and Tool Control Policy
- Commissioner's Directive 573 (1992-11-01): Establishes guidelines for controlling items critical to institution safety and security, including keys, tools, hobby craft tools, communication equipment, dangerous substances (gasoline, propane, solvents), and contractor tools/equipment/keys.
- Officer Responsibility: Understanding and adhering to policies outlined in Commissioner's Directive 573, Institutional Standing Orders, and Post Orders.
- Institutional Standing Orders: Provide more specific directions tailored to each institution's security classification, facility structure, and layout.
- Post Orders: Provide even more specific directions for each post.
- Why Control is Important: Uncontrolled access to keys and tools allows for misuse, posing a threat to institutional security, safety for staff, offenders, and the public. Examples include potential escape attempts, unauthorized access to restricted areas, and facilitation of illicit activities.
- Security Classification: Risk and control measures vary based on institutional security classification (maximum, medium, minimum, multi-level). Higher classifications necessitate stricter control.
Key Control
-
Key Classes: Keys are categorized for varying levels of risk:
- Prohibited (P): Critically important to safety and security, e.g., armory, armed/central control posts, communication control, and electronic security equipment areas (needs extra handling and storage procedures).
- Restricted (R): Security keys for custody and control within the institution (e.g., cell doors, movement barriers, fire doors, internal control posts, key safes, shop doors), also needs standard handling procedures but less strict than prohibited.
- Non-Restricted (N): Keys for daily operational needs with negligible misuse risk (e.g., workshop cupboards, offender accommodation, storage lockers).
-
Key Types:
- Folger-Adams Key: High-security locking devices for critical areas/documents/equipment. More difficult to pick and duplicate.
- "Best" Key: For less critical areas, offering a second layer of protection; commonly used with Folger-Adams.
- Proximity Card: Electronic key; requires a "card reader" device. Allows for tracking access. Can be manually overridden in emergencies.
Tool Control
-
Tool Classes: Tools are categorized based on risk:
- Non-Restricted (N): Low escape/weapon risk; generally used without direct staff supervision (e.g., wood saw, socket wrench, tape measure).
- Restricted (R): High escape/weapon risk; used by offenders under direct staff supervision (e.g., hammers, screwdrivers, hacksaw blades, pliers).
- Prohibited (P): Extremely dangerous in offenders' hands; never issued to offenders without direct supervision (e.g., knives, acetylene cutting torches, bolt cutters).
- Tool Storage: Methods include shadow boards (color-coded), tool cribs (restricted tools), secure storage (prohibited tools), individual tool kits, tool boxes/cabinets (with inventories).
Key and Tool Control Procedures
- Daily Verification: Ensure all assigned keys/tools are accounted for at the start and end of each shift, checking against inventory and recording this in shift logs.
- Key/Tool Handling: Proper handling by providing and receiving keys from authorized staff; prohibiting throwing keys.
- Security Checks: Regularly verify for open locking mechanisms/damaged devices and report immediately.
- Loss Reporting: Report missing keys or tools immediately to the appropriate authority.
- Contractor Tool Control: Authorized tools/equipment/keys; inventory before and after contractor activities. Check for extra items.
- Offender Access Restrictions: Ensure prohibited and restricted items are not accessible to offenders.
Emergency Keys
- Quick Access during Emergencies: A limited selection of emergency keys (often in a specific location or color-coded) is for speed during crises.
Dangerous Substances Control
- Control Necessary: Procedures exist for the acquisition, use, and storage of dangerous substances like gasoline, propane, solvents, etc., to maintain safety.
- Officer vigilance: Officers need to be aware of locations/people handling these substances, ensuring they are used and stored appropriately.
- Contractor Oversight: Verification tools/substances are authorized and secure.
General Guidelines
- Training Requirements: Officers must understand the specific policies and procedures for their assigned institution.
- Layered Protection: Multiple layers of security devices (and locking mechanisms involving Folger-Adams keys) are implemented to prevent escapes and control access.
- Questioning/Verification: Always check the authorization of people accessing tools or security items.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your understanding by matching various security items with their descriptions, risks, and classifications. This quiz covers key aspects of security measures within institutions, focusing on policy documents, security classifications, and critical items. Enhance your knowledge of security protocols and their implications in daily operations.