Security Classification Matching Quiz
88 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Match the following items to their potential risks in an institution:

Keys = Access to restricted areas Acetylene cutting torches = Escape attempts Cellular phones = Illicit drug trafficking Hobby craft tools = Injury potential

Match the following policy documents with their descriptions:

Commissioner’s Directive 573 = General guidelines for item control Institutional Standing Orders = Specific directions for each institution Post Orders = Detailed instructions regarding operations Policy documents = Frameworks for security measures

Match the following items with their categories under CD 573:

Keys = Critical items for security Communication equipment = Tools for safety coordination Dangerous Substances = Items posing safety risks Contractor tools = Equipment used by external workers

Match the following reasons for control with their corresponding implications:

<p>Misuse of tools = Threat to security Unauthorized access = Risk to offenders' safety Inadequate control measures = Increased escape attempts Access to dangerous items = Potential harm to staff and public</p> Signup and view all the answers

Match the following tools with their usage in daily operations:

<p>Ladders = Accessing high areas Hacksaw blades = Cutting materials Tools = Operational necessities Communication equipment = Facilitating contact</p> Signup and view all the answers

Match the following dangers with their relevant items:

<p>Propane = Flammable substance Bolt cutters = Escape devices Cellular phones = Means for communication Craft tools = Hobby-related risks</p> Signup and view all the answers

Match the following key aspects with their corresponding directives:

<p>Security classification = Influences Standing Orders Fundamental principles = Reflected in all policy documents Operational risk = Justifies strict controls Institutional layout = Affects control measures</p> Signup and view all the answers

Match the following items to their definitions as critical items:

<p>Keys = Facilitate access control Tools = Items for operational tasks Dangerous substances = Materials that pose hazards Communication devices = Essential for coordination</p> Signup and view all the answers

Match the following classes of keys with their descriptions:

<p>Prohibited (class P) = Keys that can seriously compromise safety if misused Restricted (class R) = Keys used by staff for control within the institution Non-restricted (class N) = Keys for daily operational needs with negligible misuse consequences All classes = Established control procedures must be followed</p> Signup and view all the answers

Match the following types of keys with their examples:

<p>Folger Adams Key = Cell doors and armed control post doors Best Key = Padlocks on filing cabinets or storage lockers Proximity Card = Access control using an embedded microchip General Key = Used for opening workshop cupboards without critical contents</p> Signup and view all the answers

Match the following security classifications with their characteristics:

<p>Maximum Security = Requires the highest level of control and supervision Medium Security = Compromises safety depending on key control Minimum Security = Allows for a more lenient access to keys Multi-level Security = Combines different levels of security measures</p> Signup and view all the answers

Match the following key classes with their handling rules:

<p>Prohibited Keys = Extra control procedures for handling required Restricted Keys = Normal control procedures must be followed Non-restricted Keys = Can be accessed by both staff and offenders All key classes = Should never be possessed by offenders</p> Signup and view all the answers

Match the following terms related to security to their definitions:

<p>Proximity Card = An electronic key for controlled access Key Safe = Locked storage for keys Critical Areas = Locations requiring high-security measures Card Reader = Device that verifies access permissions</p> Signup and view all the answers

Match the following keys with their corresponding usage details:

<p>Prohibited (class P) = Used for access to armories and critical areas Restricted (class R) = Used by staff for cell and movement control Non-restricted (class N) = Used for accessing low-risk areas like lockers Folger Adams Key = Difficult to pick and duplicate keys</p> Signup and view all the answers

Match the following items with their purposes:

<p>Exterior Doors = Access restricted by Prohibited keys Internal Control Posts = Access restricted by Restricted keys Accommodation Rooms = May use Non-restricted keys Locking Devices = Secure access control using various keys</p> Signup and view all the answers

Match the following control measures with their importance:

<p>Extra Control Procedures = Needed for handling Prohibited Keys Normal Control Procedures = Required for Restricted Keys Low Control Procedures = Applicable for Non-restricted Keys Immediate Access = Requires override in emergencies</p> Signup and view all the answers

Match the type of area with its key requirements:

<p>Critical Areas = Need Prohibited or Restricted keys Sensitive Areas = Secured with Best locking devices Operational Areas = Accessed with Non-restricted keys General Access = Allowed with Proximity Cards</p> Signup and view all the answers

Match the following key characteristics with their descriptions:

<p>Prohibited Keys = Critical for institutional safety Restricted Keys = Used by authorized staff only Non-restricted Keys = Commonly managed by offenders Proximity Card = Access determined by internal programming</p> Signup and view all the answers

Match the following key types with their security features:

<p>Folger Adams Key = More difficult to duplicate Best Key = Second layer of protection Proximity Card = Allows monitoring of access history Standard Key = Used for non-critical operations</p> Signup and view all the answers

Match the following roles with their responsibilities:

<p>Staff = Must adhere to key control procedures Offenders = Limited access to certain keys Security Maintenance Officer = Keeps a master inventory of keys Institution Manager = Imposes key control regulations</p> Signup and view all the answers

Match the following key usage scenarios with their classification:

<p>Access to Armory = Classified as Prohibited Key for Accommodation Room = Classified as Non-restricted Managing Fire Doors = Classified as Restricted Locking Workshop Cupboards = Classified as Non-restricted</p> Signup and view all the answers

Match the following types of keys with their specific risk levels:

<p>Prohibited Keys = Highest risk if compromised Restricted Keys = Serious consequences if misused Non-restricted Keys = Negligible risk involved Best Keys = Low risk but still monitored</p> Signup and view all the answers

Match the classes of tools with their descriptions:

<p>Non-restricted (class N) = Tools generally considered safe for offenders to use without supervision Restricted (class R) = Tools that could potentially be misused for escapes or weapons under supervision Prohibited (class P) = Extremely dangerous tools that offenders cannot use without staff supervision General Purpose = Tools used in various maintenance tasks in institutional facilities</p> Signup and view all the answers

Match the tool with its classification:

<p>Wood saw = Non-restricted (class N) Hammer = Restricted (class R) Knife = Prohibited (class P) Socket wrench = Non-restricted (class N)</p> Signup and view all the answers

Match the immediate action with its corresponding situation when a key or proximity card is lost:

<p>Report to Correctional Manager = After confirming the item cannot be found Verify placement on the wrong peg = Upon suspicion of loss Complete Missing Tool Report = After reporting the loss Check with fellow staff members = Immediately after suspecting loss</p> Signup and view all the answers

Match the tool type with its usage:

<p>Acetylene cutting torch = Considered prohibited due to danger Soldering iron = Non-restricted for maintenance tasks Hacksaw blades = Restricted and requires supervision Nail gun = Considered a dangerous tool typically unauthorized for offenders</p> Signup and view all the answers

Match the type of security measure with its relevant tool class:

<p>Color coded yellow = Non-restricted (class N) Direct supervision required = Restricted (class R) Never issued to offenders = Prohibited (class P) Used unsupervised in kitchens = Prohibited with restrictions</p> Signup and view all the answers

Match the action to its category during a security check:

<p>Routine door security checks = Essential for maintaining facility safety Checking tool color codes = Staff responsibility for safe issuance Immediate tool reporting = Action after noticing a loss Staff training on tool classes = Critical for ensuring proper supervision</p> Signup and view all the answers

Match the following tools with their security classification color code:

<p>Pliers = Blue (Restricted) Tape measure = Yellow (Non-restricted) Knives in kitchen = Red (Prohibited, under specific use) Sledgehammer = Blue (Restricted)</p> Signup and view all the answers

Match the scenario with the necessary follow-up action:

<p>Key falls into the wrong place = Verify placement immediately Loss of a provisional card = Report to the Correctional Manager Tool suspected missing = Conduct a quick search Prohibited tool found = Complete an incident report</p> Signup and view all the answers

Match the types of threats posed by tools to their descriptions:

<p>Escape tools = Used to facilitate offender escapes Weaponized tools = Possibility of fashioning into a weapon Construction tools = May be misused if not monitored General maintenance tools = Essential for daily operations but monitored</p> Signup and view all the answers

Match the type of offender tool use with its context:

<p>Unsupervised knife use in kitchens = Specific exception in some institutions Daily checks of locking mechanisms = Routine security measure Tools in carpentry shops = Legitimate use under supervision Emergency tool reporting = Critical upon loss confirmation</p> Signup and view all the answers

Match the security classification with its potential risk:

<p>Prohibited tools = Highly dangerous and strictly monitored Restricted tools = Possible misuse but allowed under supervision Non-restricted tools = Considered generally safe for use Contractor tools = Potentially dangerous if not monitored</p> Signup and view all the answers

Match the item with its operational relevance:

<p>Missing Tool Report = Document outlining loss circumstances Correctional Manager roles = In charge of shift security Regular checks = Preventive measure against security breaches Staff supervision of restricted tools = Ensure safety during use</p> Signup and view all the answers

Match the key and tool control terminology with their correct descriptions:

<p>Key Ring = Secures multiple keys for a specific operational area Key Tag System = Allows staff to borrow keys using personal identifiers Emergency Keys = Keys required for quick access during emergencies Key Issue Register = Records details of keys issued and returned</p> Signup and view all the answers

Match the type of key safe with its primary function:

<p>Operational Area Key Safe = Holds keys specific to a certain operational area Duty Office Key Safe = Stores emergency and backup operational keys Main Gate Key Safe = Serves non-staffed operational areas' key storage Electronic Key Safe = Requires a PIN for electronic access</p> Signup and view all the answers

Match the key control terms with their roles:

<p>Security Maintenance Officer (SMO) = Maintains the Key Registry Key Registry = Lists all keys and their locations Key Safe = Secure storage for key rings and keys Key Tag = Identifies staff members' key borrowing</p> Signup and view all the answers

Match the situation with the appropriate key control measure:

<p>Lost key situation = Use Key Issue Register Daily shift end = Return keys to the operational key safe Emergency response = Use Emergency Keys Key borrowing = Use Key Tag System</p> Signup and view all the answers

Match the function with the correct term:

<p>Locking mechanism access = Emergency Keys Physical key identification = Key Tag Key borrowing record = Key Issue Register Stored location for keys = Key Safe</p> Signup and view all the answers

Match the base materials with their key control applications:

<p>Metal Key Ring = Groups keys together Clear Pouch = Stores emergency keys for visibility Electronic Box = Secure electronic access to keys Written Inventory = Lists contents of a key safe</p> Signup and view all the answers

Match the terminology with relevant operational context:

<p>Key Ring = Operational area keys grouped together Emergency Keys = Rapid access during incidents Main Gate Key Safe = Returns keys from non-staffed areas Key Tag System = Measures key borrowing for accountability</p> Signup and view all the answers

Match the description with the type of key safe:

<p>Duty Office Key Safe = Stores operational area and emergency keys Operational Area Key Safe = Houses keys for specific operational needs Main Gate Key Safe = Central storage for all non-staffed areas Electronic Key Safe = Access via keypad and PIN</p> Signup and view all the answers

Match the process with the correct key terminology:

<p>Issuing keys = Key Issue Register Identifying personal keys = Key Tag System Storing keys securely = Key Safe Tracking key usage = Key Registry</p> Signup and view all the answers

Match each key element with its importance:

<p>Emergency Keys = Ensuring quick access under pressure Key Tag System = Identifying staff possession of keys Key Safe = Providing a secure storage solution Key Registry = Recording key movements</p> Signup and view all the answers

Match the type of key storage with the appropriate need:

<p>Key Registry = Maintaining unique identifiers for keys Key Safe = Securing multiple key rings Emergency Keys = Assuring rapid access in crisis Main Gate Key Safe = Returning keys after shifts</p> Signup and view all the answers

Match the key management term with its description:

<p>Key Safe = Storage device for grouped keys Key Tag = Allows accountability in key borrowing Emergency Keys = Designated for urgent access during crises Key Issue Register = Logs detailed history of key transactions</p> Signup and view all the answers

Match the key storage type with its specific characteristic:

<p>Electronic Key Safe = Locks/unlocks via PIN Operational Area Key Safe = Key storage within operational zones Main Gate Key Safe = Accessed outside of operational hours Duty Office Key Safe = Houses emergency access keys</p> Signup and view all the answers

Match the control measure with the scenario it addresses:

<p>Emergency Keys = Needed during a riot or fire Key Issue Register = When borrowing keys long-term Key Tag System = Managing daily key access for staff Operational Area Key Safe = Daily shift key storage and management</p> Signup and view all the answers

Match the concept with its utility in key management:

<p>Key Registry = Informs about key location and identifiers Key Safe = Provides a physical secure storage place Emergency Keys = Are specially designated for urgent access Key Tag System = Enables quick identification of key holders</p> Signup and view all the answers

Match the type of lock with its description:

<p>Single Lock = Key used to roll the tumbler once; free-floating plunger. Double Lock = Key used to roll the tumbler twice; fixed plunger. Folger-Adams Key = Key used to access secure control posts. Best Lock = Locking device used for individual offices.</p> Signup and view all the answers

Match the following security layers with their purpose:

<p>Static Security Devices = Provide stationary layers of protection. Dynamic Security Skills = Utilize officer skills for protection. Key Safe = Store non-essential keys securely. Key Control Procedures = Guidelines to manage keys effectively.</p> Signup and view all the answers

Match the key control procedures with their importance:

<p>Verify keys at shift change = Ensures all keys are accounted for. Immediate reporting of missing keys = Prevents unauthorized access. Pat-down before leaving site = Ensures no keys are taken unintentionally. Authorized issuing of keys = Prevents key misuse by offenders.</p> Signup and view all the answers

Match the type of institution with its security characteristics:

<p>Maximum Security = Most layers of protection used. Medium Security = Some static barriers, fewer layers. Minimum Security = Minimal layers of protection. Restricted Movement Unit = Access is tightly controlled.</p> Signup and view all the answers

Match the item with its locking necessity:

<p>Filing Cabinet = Protected by a locking bar and padlock. Department Area Door = Secured by a Folger-Adams key. Emergency Keys = Identified by specific marks. Locking Device = Managed through key inventory documents.</p> Signup and view all the answers

Match the following dangerous substances with their corresponding hazards:

<p>Solvent soaked rags = Fire hazard when left unsecured Gasoline in a container = Risk of explosion when unsecured Hollow frame hacksaw = Potential for hidden blades Unauthorized tools = Security risk for institution</p> Signup and view all the answers

Match the security risks with their control measures:

<p>Offender Escapes = Using layered security devices. Unauthorized Access = Vigilance in key control. Tampering with Locks = Reports to officers in charge. Key Misuse = Strict issuing procedures.</p> Signup and view all the answers

Match the following tool control activities with their purposes:

<p>Verify authorized tools = Ensure compliance with Tool Registry Check locking tool boxes = Secure tools not in immediate use Account for tools before departure = Prevent loss of contractor tools Confirm no cellular phones = Maintain communication protocol</p> Signup and view all the answers

Match the electronic key control features with their functions:

<p>Master panel = Visual status of doors and barriers Manual key system = Backup method for malfunction Electronic keys = Control main barriers electronically Electric failure alerts = Notify staff of potential issues</p> Signup and view all the answers

Match the key control task with its action:

<p>Record key verification = Post logbook entries. Questioning key access = Communication skills assessment. Learning emergency keys = Identification by location or color. Immediate reporting = Notify officer in charge.</p> Signup and view all the answers

Match the term with its definition:

<p>Key Safe = Container for storing keys. Plunger in Lock = Barrier that secures the locking mechanism. Tumbler = Component rolled by the key to unlock. Locking Device = Mechanism requiring a key or electronic control.</p> Signup and view all the answers

Match the following scenarios with the appropriate cautionary advice:

<p>New correctional officer with ladder = Check colour coding and tool classifications Contractor with hacksaw = Inquire about spare blades in tools Hollow tool misuse = Ensure all potential risks are communicated Entering through a proximity card = Be vigilant of following others</p> Signup and view all the answers

Match the operational procedure with its purpose:

<p>Initial key check = Ensures all keys are ready for operation. Key inventory check = Confirms keys’ locations. Tampered locks report = Informs about potential security breaches. Key handover = Ensures keys stay with authorized personnel.</p> Signup and view all the answers

Match the following procedures regarding outside contractors with their descriptions:

<p>Pre-authorization of tools = Required before contractor arrival Tool Registry form = Documents authorized tools Written procedure information = Outlines tool control protocols Unauthorized tool removal = Must be secured by officers</p> Signup and view all the answers

Match the following tool inspection tasks with their importance:

<p>Checking contractor vehicle = Prevents entry of dangerous items Securing unauthorized tools = Limits security risks Verifying tool accountability = Aids in loss prevention Inspecting communication devices = Ensures prohibited items are not present</p> Signup and view all the answers

Match the term with its related action:

<p>Key Issue Registry = Document for tracking key issuances. Vigilance in monitoring = Observing suspicious key access. Malfunctioning lock report = Notify control officials immediately. Emergency key retrieval = Selecting keys by identifying features.</p> Signup and view all the answers

Match the security principle with its application:

<p>Layered Protection = Utilizing multiple static barriers. Static Security = Fixed measures against breaches. Key Control = Robust management of key usage. Dynamic Security = Reactivity of staff in the situation.</p> Signup and view all the answers

Match the electronic locking device components with their roles:

<p>Toggles and switches = Control access electronically Secure control posts = House electronic key systems Visual alerts from master panel = Monitor door status Backup manual keys = Open in case of power failure</p> Signup and view all the answers

Match the type of key with its usage context:

<p>Emergency Key = Used in crisis situations. Prohibited Key = Restricted access for offenders. Control Post Key = Access for secure areas. Regular Key = Used for everyday operations.</p> Signup and view all the answers

Match the following construction scenarios with their outcomes:

<p>Improper storage of gasoline = Potential fire hazard Open access to off-site tools = Increased risk of theft Unauthorized tool presence = Violation of security protocols Inadequate communication monitoring = Safety breaches during active work</p> Signup and view all the answers

Match the following contractor responsibilities with their corresponding rules:

<p>Use of secured tool boxes = Prevents unauthorized access Monitoring tool usage during work = Ensures compliance with procedures Reporting lost tools = Informs authority of security breaches Adhering to communication protocols = Safeguards institutional integrity</p> Signup and view all the answers

Match the key control protocol with its requirement:

<p>Pat-down protocol = Prevent unauthorized key removal. Key verification = Ensures accountability at shifts. Report missing keys = Prompt action to prevent issues. Authorized handling = No offender access to restricted keys.</p> Signup and view all the answers

Match the security area with its necessary actions:

<p>Institution Entrance = Report any key breaches. Key Safe Area = Verify key presence regularly. Control Room = Maintain enhanced monitoring. Locked Offices = Ensure all locks are secured.</p> Signup and view all the answers

Match the following color coding of tools with their significance:

<p>Yellow ladders = Workplace safety requirement Red tools = Prohibited items Green tools = Approved for unrestricted use Blue tools = Contact tools for special tasks</p> Signup and view all the answers

Match the key control responsibility with its expected behavior:

<p>Stay vigilant = Monitor access attempts. Record keeping = Maintain an accurate key log. Notify about issues = Immediate reporting to authorities. Proper handling = Avoid throwing or mishandling keys.</p> Signup and view all the answers

Match the storage method with its description:

<p>Shadow Boards = Identify if a tool is missing Tool Room (Crib) = Storage restricted from offender access Secure Storage = Prohibited tools stored in a secure area Tool Boxes/Cabinets = Used when other storage methods are not applicable</p> Signup and view all the answers

Match the tool class with its category:

<p>Class R = Restricted tools Class P = Prohibited tools Class N = Non-restricted tools Shadowed tools = Identifying missing tools</p> Signup and view all the answers

Match the action with when to perform it:

<p>Report any missing tool = Immediately after discovering the loss Complete a Missing Tool Report = After notifying the manager Check authorization of tools = Before allowing offenders to use tools Validate hobby craft tools = During routine cell searches</p> Signup and view all the answers

Match the procedure with its requirement:

<p>Using shadow boards = To help identify missing tools Daily tool accounting = To maintain accurate inventory Prohibiting offenders from tools = To enhance security Regular policy review = To ensure compliance with tool control procedures</p> Signup and view all the answers

Match the following tools with their risk:

<p>Hobby craft tools = Could be misused as weapons Chemical substances = Present security dangers Power tools = Require supervision for offenders Non-restricted tools = Can be issued daily when needed</p> Signup and view all the answers

Match the hobby craft tools with their application:

<p>Leather work tools = Authorized for use by specific offenders Scissors = Require control procedures Painting supplies = Must be displayed on a permit Wood carving tools = Used in designated areas only</p> Signup and view all the answers

Match the item with its storage condition:

<p>Prohibited tools = Stored in a secure area Restricted tools = Stored in a tool room Shadow boards = Used for tool identification Individual tool kits = Issued based on daily demand</p> Signup and view all the answers

Match the authority with their responsibility:

<p>Institutional head = Authorizes hobby craft tools Correctional Manager = Notifies others when tools are missing Staff member = Oversees tool usage by offenders Volunteer = Requires authorization for tool entry</p> Signup and view all the answers

Match the color code with its associated tool status:

<p>Red color code = Prohibited tools Blue color code = Restricted tools Light green background = Shadow board color No color code = Non-restricted tools</p> Signup and view all the answers

Match the tool procedure with its guideline:

<p>Do not loan tools = To unauthorized offenders Report discrepancies = Immediately at the entrance Use inventory forms = To account for tools being brought in Keep tools secured = During contractor visits</p> Signup and view all the answers

Match the type of tool with its registration requirement:

<p>Hobby craft tools = Must have a permit displayed Contractor tools = Must be inventoried on Tool Register Restricted tools = Required to be stored in a crib Prohibited tools = Must not be in possession by offenders</p> Signup and view all the answers

Match the tool usage guideline with the timing:

<p>Check authorization = Before offender uses a tool Conduct cell searches = To verify tool presence Look for left tools = While moving about the institution Complete tool inventory = At the start of each shift</p> Signup and view all the answers

Match the incident with its potential response:

<p>Tool found in unauthorized area = Seize and report to authority Offender with unauthorized tool = Verify and take necessary action Missing tool incident = Complete a report Contractor present = Monitor tools and offenders closely</p> Signup and view all the answers

Match the following risks with their control measures:

<p>Unauthorized tool possession = Supervision by staff required Chemical substance misuse = Restricted access Hobby craft tools as weapons = Specific control procedures apply Leaving tools unattended = Regularly check sites</p> Signup and view all the answers

Study Notes

Key and Tool Control Policy

  • Commissioner's Directive 573 (1992-11-01): Establishes guidelines for controlling items critical to institution safety and security, including keys, tools, hobby craft tools, communication equipment, dangerous substances (gasoline, propane, solvents), and contractor tools/equipment/keys.
  • Officer Responsibility: Understanding and adhering to policies outlined in Commissioner's Directive 573, Institutional Standing Orders, and Post Orders.
  • Institutional Standing Orders: Provide more specific directions tailored to each institution's security classification, facility structure, and layout.
  • Post Orders: Provide even more specific directions for each post.
  • Why Control is Important: Uncontrolled access to keys and tools allows for misuse, posing a threat to institutional security, safety for staff, offenders, and the public. Examples include potential escape attempts, unauthorized access to restricted areas, and facilitation of illicit activities.
  • Security Classification: Risk and control measures vary based on institutional security classification (maximum, medium, minimum, multi-level). Higher classifications necessitate stricter control.

Key Control

  • Key Classes: Keys are categorized for varying levels of risk:
    • Prohibited (P): Critically important to safety and security, e.g., armory, armed/central control posts, communication control, and electronic security equipment areas (needs extra handling and storage procedures).
    • Restricted (R): Security keys for custody and control within the institution (e.g., cell doors, movement barriers, fire doors, internal control posts, key safes, shop doors), also needs standard handling procedures but less strict than prohibited.
    • Non-Restricted (N): Keys for daily operational needs with negligible misuse risk (e.g., workshop cupboards, offender accommodation, storage lockers).
  • Key Types:
    • Folger-Adams Key: High-security locking devices for critical areas/documents/equipment. More difficult to pick and duplicate.
    • "Best" Key: For less critical areas, offering a second layer of protection; commonly used with Folger-Adams.
    • Proximity Card: Electronic key; requires a "card reader" device. Allows for tracking access. Can be manually overridden in emergencies.

Tool Control

  • Tool Classes: Tools are categorized based on risk:
    • Non-Restricted (N): Low escape/weapon risk; generally used without direct staff supervision (e.g., wood saw, socket wrench, tape measure).
    • Restricted (R): High escape/weapon risk; used by offenders under direct staff supervision (e.g., hammers, screwdrivers, hacksaw blades, pliers).
    • Prohibited (P): Extremely dangerous in offenders' hands; never issued to offenders without direct supervision (e.g., knives, acetylene cutting torches, bolt cutters).
  • Tool Storage: Methods include shadow boards (color-coded), tool cribs (restricted tools), secure storage (prohibited tools), individual tool kits, tool boxes/cabinets (with inventories).

Key and Tool Control Procedures

  • Daily Verification: Ensure all assigned keys/tools are accounted for at the start and end of each shift, checking against inventory and recording this in shift logs.
  • Key/Tool Handling: Proper handling by providing and receiving keys from authorized staff; prohibiting throwing keys.
  • Security Checks: Regularly verify for open locking mechanisms/damaged devices and report immediately.
  • Loss Reporting: Report missing keys or tools immediately to the appropriate authority.
  • Contractor Tool Control: Authorized tools/equipment/keys; inventory before and after contractor activities. Check for extra items.
  • Offender Access Restrictions: Ensure prohibited and restricted items are not accessible to offenders.

Emergency Keys

  • Quick Access during Emergencies: A limited selection of emergency keys (often in a specific location or color-coded) is for speed during crises.

Dangerous Substances Control

  • Control Necessary: Procedures exist for the acquisition, use, and storage of dangerous substances like gasoline, propane, solvents, etc., to maintain safety.
  • Officer vigilance: Officers need to be aware of locations/people handling these substances, ensuring they are used and stored appropriately.
  • Contractor Oversight: Verification tools/substances are authorized and secure.

General Guidelines

  • Training Requirements: Officers must understand the specific policies and procedures for their assigned institution.
  • Layered Protection: Multiple layers of security devices (and locking mechanisms involving Folger-Adams keys) are implemented to prevent escapes and control access.
  • Questioning/Verification: Always check the authorization of people accessing tools or security items.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your understanding by matching various security items with their descriptions, risks, and classifications. This quiz covers key aspects of security measures within institutions, focusing on policy documents, security classifications, and critical items. Enhance your knowledge of security protocols and their implications in daily operations.

More Like This

SFPC Flashcards: Classification Terms
46 questions
Network Security Classifications
10 questions

Network Security Classifications

WellReceivedSquirrel7948 avatar
WellReceivedSquirrel7948
Use Quizgecko on...
Browser
Browser