Podcast
Questions and Answers
Match the following items to their potential risks in an institution:
Match the following items to their potential risks in an institution:
Keys = Access to restricted areas Acetylene cutting torches = Escape attempts Cellular phones = Illicit drug trafficking Hobby craft tools = Injury potential
Match the following policy documents with their descriptions:
Match the following policy documents with their descriptions:
Commissioner’s Directive 573 = General guidelines for item control Institutional Standing Orders = Specific directions for each institution Post Orders = Detailed instructions regarding operations Policy documents = Frameworks for security measures
Match the following items with their categories under CD 573:
Match the following items with their categories under CD 573:
Keys = Critical items for security Communication equipment = Tools for safety coordination Dangerous Substances = Items posing safety risks Contractor tools = Equipment used by external workers
Match the following reasons for control with their corresponding implications:
Match the following reasons for control with their corresponding implications:
Match the following tools with their usage in daily operations:
Match the following tools with their usage in daily operations:
Match the following dangers with their relevant items:
Match the following dangers with their relevant items:
Match the following key aspects with their corresponding directives:
Match the following key aspects with their corresponding directives:
Match the following items to their definitions as critical items:
Match the following items to their definitions as critical items:
Match the following classes of keys with their descriptions:
Match the following classes of keys with their descriptions:
Match the following types of keys with their examples:
Match the following types of keys with their examples:
Match the following security classifications with their characteristics:
Match the following security classifications with their characteristics:
Match the following key classes with their handling rules:
Match the following key classes with their handling rules:
Match the following terms related to security to their definitions:
Match the following terms related to security to their definitions:
Match the following keys with their corresponding usage details:
Match the following keys with their corresponding usage details:
Match the following items with their purposes:
Match the following items with their purposes:
Match the following control measures with their importance:
Match the following control measures with their importance:
Match the type of area with its key requirements:
Match the type of area with its key requirements:
Match the following key characteristics with their descriptions:
Match the following key characteristics with their descriptions:
Match the following key types with their security features:
Match the following key types with their security features:
Match the following roles with their responsibilities:
Match the following roles with their responsibilities:
Match the following key usage scenarios with their classification:
Match the following key usage scenarios with their classification:
Match the following types of keys with their specific risk levels:
Match the following types of keys with their specific risk levels:
Match the classes of tools with their descriptions:
Match the classes of tools with their descriptions:
Match the tool with its classification:
Match the tool with its classification:
Match the immediate action with its corresponding situation when a key or proximity card is lost:
Match the immediate action with its corresponding situation when a key or proximity card is lost:
Match the tool type with its usage:
Match the tool type with its usage:
Match the type of security measure with its relevant tool class:
Match the type of security measure with its relevant tool class:
Match the action to its category during a security check:
Match the action to its category during a security check:
Match the following tools with their security classification color code:
Match the following tools with their security classification color code:
Match the scenario with the necessary follow-up action:
Match the scenario with the necessary follow-up action:
Match the types of threats posed by tools to their descriptions:
Match the types of threats posed by tools to their descriptions:
Match the type of offender tool use with its context:
Match the type of offender tool use with its context:
Match the security classification with its potential risk:
Match the security classification with its potential risk:
Match the item with its operational relevance:
Match the item with its operational relevance:
Match the key and tool control terminology with their correct descriptions:
Match the key and tool control terminology with their correct descriptions:
Match the type of key safe with its primary function:
Match the type of key safe with its primary function:
Match the key control terms with their roles:
Match the key control terms with their roles:
Match the situation with the appropriate key control measure:
Match the situation with the appropriate key control measure:
Match the function with the correct term:
Match the function with the correct term:
Match the base materials with their key control applications:
Match the base materials with their key control applications:
Match the terminology with relevant operational context:
Match the terminology with relevant operational context:
Match the description with the type of key safe:
Match the description with the type of key safe:
Match the process with the correct key terminology:
Match the process with the correct key terminology:
Match each key element with its importance:
Match each key element with its importance:
Match the type of key storage with the appropriate need:
Match the type of key storage with the appropriate need:
Match the key management term with its description:
Match the key management term with its description:
Match the key storage type with its specific characteristic:
Match the key storage type with its specific characteristic:
Match the control measure with the scenario it addresses:
Match the control measure with the scenario it addresses:
Match the concept with its utility in key management:
Match the concept with its utility in key management:
Match the type of lock with its description:
Match the type of lock with its description:
Match the following security layers with their purpose:
Match the following security layers with their purpose:
Match the key control procedures with their importance:
Match the key control procedures with their importance:
Match the type of institution with its security characteristics:
Match the type of institution with its security characteristics:
Match the item with its locking necessity:
Match the item with its locking necessity:
Match the following dangerous substances with their corresponding hazards:
Match the following dangerous substances with their corresponding hazards:
Match the security risks with their control measures:
Match the security risks with their control measures:
Match the following tool control activities with their purposes:
Match the following tool control activities with their purposes:
Match the electronic key control features with their functions:
Match the electronic key control features with their functions:
Match the key control task with its action:
Match the key control task with its action:
Match the term with its definition:
Match the term with its definition:
Match the following scenarios with the appropriate cautionary advice:
Match the following scenarios with the appropriate cautionary advice:
Match the operational procedure with its purpose:
Match the operational procedure with its purpose:
Match the following procedures regarding outside contractors with their descriptions:
Match the following procedures regarding outside contractors with their descriptions:
Match the following tool inspection tasks with their importance:
Match the following tool inspection tasks with their importance:
Match the term with its related action:
Match the term with its related action:
Match the security principle with its application:
Match the security principle with its application:
Match the electronic locking device components with their roles:
Match the electronic locking device components with their roles:
Match the type of key with its usage context:
Match the type of key with its usage context:
Match the following construction scenarios with their outcomes:
Match the following construction scenarios with their outcomes:
Match the following contractor responsibilities with their corresponding rules:
Match the following contractor responsibilities with their corresponding rules:
Match the key control protocol with its requirement:
Match the key control protocol with its requirement:
Match the security area with its necessary actions:
Match the security area with its necessary actions:
Match the following color coding of tools with their significance:
Match the following color coding of tools with their significance:
Match the key control responsibility with its expected behavior:
Match the key control responsibility with its expected behavior:
Match the storage method with its description:
Match the storage method with its description:
Match the tool class with its category:
Match the tool class with its category:
Match the action with when to perform it:
Match the action with when to perform it:
Match the procedure with its requirement:
Match the procedure with its requirement:
Match the following tools with their risk:
Match the following tools with their risk:
Match the hobby craft tools with their application:
Match the hobby craft tools with their application:
Match the item with its storage condition:
Match the item with its storage condition:
Match the authority with their responsibility:
Match the authority with their responsibility:
Match the color code with its associated tool status:
Match the color code with its associated tool status:
Match the tool procedure with its guideline:
Match the tool procedure with its guideline:
Match the type of tool with its registration requirement:
Match the type of tool with its registration requirement:
Match the tool usage guideline with the timing:
Match the tool usage guideline with the timing:
Match the incident with its potential response:
Match the incident with its potential response:
Match the following risks with their control measures:
Match the following risks with their control measures:
Flashcards
What is Commissioner's Directive 573?
What is Commissioner's Directive 573?
Directive 573 outlines the general guidelines for controlling items critical to the security and safety of a correctional institution. It covers items like keys, tools, dangerous substances and communication equipment.
What are 'items critical to the security and safety of the institution'?
What are 'items critical to the security and safety of the institution'?
Items that are controlled by Commissioner's Directive 573 due to their potential for security risks and safety threats within the institution.
Explain Institutional Standing Orders.
Explain Institutional Standing Orders.
Each correctional facility has its own set of rules about how to control critical items, which are more specific than Directive 573.
What are Post Orders?
What are Post Orders?
Signup and view all the flashcards
Why is access to Restricted Movement area keys a major concern?
Why is access to Restricted Movement area keys a major concern?
Signup and view all the flashcards
Why is controlling access to tools like cutting torches and ladders important in prisons?
Why is controlling access to tools like cutting torches and ladders important in prisons?
Signup and view all the flashcards
Explain the risk of inmates having access to cell phones?
Explain the risk of inmates having access to cell phones?
Signup and view all the flashcards
Why is the control of critical items so crucial?
Why is the control of critical items so crucial?
Signup and view all the flashcards
Prohibited Keys (Class P)
Prohibited Keys (Class P)
Signup and view all the flashcards
Restricted Keys (Class R)
Restricted Keys (Class R)
Signup and view all the flashcards
Non-restricted Keys (Class N)
Non-restricted Keys (Class N)
Signup and view all the flashcards
Folger Adams Key
Folger Adams Key
Signup and view all the flashcards
Best Key
Best Key
Signup and view all the flashcards
Proximity Card
Proximity Card
Signup and view all the flashcards
Proximity Card for Offenders
Proximity Card for Offenders
Signup and view all the flashcards
Manual Override for Proximity Cards
Manual Override for Proximity Cards
Signup and view all the flashcards
Electronic Override for Proximity Cards
Electronic Override for Proximity Cards
Signup and view all the flashcards
Key Inventory Management
Key Inventory Management
Signup and view all the flashcards
Security Classification and Control
Security Classification and Control
Signup and view all the flashcards
Variations in Control Procedures
Variations in Control Procedures
Signup and view all the flashcards
Prohibition of Personal Cell Phones
Prohibition of Personal Cell Phones
Signup and view all the flashcards
Institutional Variations in Control Measures
Institutional Variations in Control Measures
Signup and view all the flashcards
What is a key ring?
What is a key ring?
Signup and view all the flashcards
What is a key ring tag?
What is a key ring tag?
Signup and view all the flashcards
What is a Key Registry?
What is a Key Registry?
Signup and view all the flashcards
What are key tags?
What are key tags?
Signup and view all the flashcards
How does the key tag system work?
How does the key tag system work?
Signup and view all the flashcards
What are emergency keys?
What are emergency keys?
Signup and view all the flashcards
What is a key safe?
What is a key safe?
Signup and view all the flashcards
What is an operational area key safe?
What is an operational area key safe?
Signup and view all the flashcards
What is a duty office key safe?
What is a duty office key safe?
Signup and view all the flashcards
What is a main gate key safe?
What is a main gate key safe?
Signup and view all the flashcards
What is a key issue register?
What is a key issue register?
Signup and view all the flashcards
What are Commissioner's Directives?
What are Commissioner's Directives?
Signup and view all the flashcards
What are Institutional Standing Orders?
What are Institutional Standing Orders?
Signup and view all the flashcards
Why is controlling access to restricted movement area keys a major concern?
Why is controlling access to restricted movement area keys a major concern?
Signup and view all the flashcards
Why is controlling tools like cutting torches and ladders important in prisons?
Why is controlling tools like cutting torches and ladders important in prisons?
Signup and view all the flashcards
What is a Double Lock?
What is a Double Lock?
Signup and view all the flashcards
What is a Folger-Adams Key?
What is a Folger-Adams Key?
Signup and view all the flashcards
What is Layered Protection?
What is Layered Protection?
Signup and view all the flashcards
What is Key Verification?
What is Key Verification?
Signup and view all the flashcards
What is a 'Pat-Down'?
What is a 'Pat-Down'?
Signup and view all the flashcards
What is an Emergency Key?
What is an Emergency Key?
Signup and view all the flashcards
What is a Key Tag System?
What is a Key Tag System?
Signup and view all the flashcards
What is Key Vigilance?
What is Key Vigilance?
Signup and view all the flashcards
What is a Tampered Locking Device?
What is a Tampered Locking Device?
Signup and view all the flashcards
What is an SOR (Security Observation Report)?
What is an SOR (Security Observation Report)?
Signup and view all the flashcards
What is a Restricted Movement Unit (RMU)?
What is a Restricted Movement Unit (RMU)?
Signup and view all the flashcards
What is Proximity Card Access?
What is Proximity Card Access?
Signup and view all the flashcards
Dangerous Substance
Dangerous Substance
Signup and view all the flashcards
CO-PW's Role in Dangerous Substance Control
CO-PW's Role in Dangerous Substance Control
Signup and view all the flashcards
Contractor Tools & Security Risk
Contractor Tools & Security Risk
Signup and view all the flashcards
Tool Registry for Contractors
Tool Registry for Contractors
Signup and view all the flashcards
Contractor Vehicle Search by CO-PWs
Contractor Vehicle Search by CO-PWs
Signup and view all the flashcards
Verification of Tools Upon Contractor Departure
Verification of Tools Upon Contractor Departure
Signup and view all the flashcards
Locking Toolboxes for Secure Storage
Locking Toolboxes for Secure Storage
Signup and view all the flashcards
Prohibition of Cellular Phones for Contractors
Prohibition of Cellular Phones for Contractors
Signup and view all the flashcards
Electronic Keys for Access Control
Electronic Keys for Access Control
Signup and view all the flashcards
Manual Keys as Backup
Manual Keys as Backup
Signup and view all the flashcards
Master Panel for Door Status
Master Panel for Door Status
Signup and view all the flashcards
CO-PW's Role in Contractor Tool Control
CO-PW's Role in Contractor Tool Control
Signup and view all the flashcards
Hacksaw Blade Incident
Hacksaw Blade Incident
Signup and view all the flashcards
Defeating Proximity Cards
Defeating Proximity Cards
Signup and view all the flashcards
Routine lock checks
Routine lock checks
Signup and view all the flashcards
What are 'critical items'?
What are 'critical items'?
Signup and view all the flashcards
What is a 'key loss procedure'?
What is a 'key loss procedure'?
Signup and view all the flashcards
Tools in a Correctional Facility
Tools in a Correctional Facility
Signup and view all the flashcards
What are the 'Tool Classes'?
What are the 'Tool Classes'?
Signup and view all the flashcards
What are 'Non-restricted tools'?
What are 'Non-restricted tools'?
Signup and view all the flashcards
What are 'Restricted tools'?
What are 'Restricted tools'?
Signup and view all the flashcards
What are 'Prohibited tools'?
What are 'Prohibited tools'?
Signup and view all the flashcards
What are 'Kitchen Knives'?
What are 'Kitchen Knives'?
Signup and view all the flashcards
What is 'key accountability'?
What is 'key accountability'?
Signup and view all the flashcards
What is a 'key search'?
What is a 'key search'?
Signup and view all the flashcards
What is a 'Missing Tool Report'?
What is a 'Missing Tool Report'?
Signup and view all the flashcards
What is a 'Restricted Movement Area'?
What is a 'Restricted Movement Area'?
Signup and view all the flashcards
What is 'Communication Equipment'?
What is 'Communication Equipment'?
Signup and view all the flashcards
What is 'Critical Item Control'?
What is 'Critical Item Control'?
Signup and view all the flashcards
What is the color scheme for Shadow Boards?
What is the color scheme for Shadow Boards?
Signup and view all the flashcards
Where are Prohibited tools stored?
Where are Prohibited tools stored?
Signup and view all the flashcards
How are Non-Restricted tools managed?
How are Non-Restricted tools managed?
Signup and view all the flashcards
What's the alternative storage method for tools?
What's the alternative storage method for tools?
Signup and view all the flashcards
What's the daily routine for tool control?
What's the daily routine for tool control?
Signup and view all the flashcards
Who can possess Restricted or Prohibited tools?
Who can possess Restricted or Prohibited tools?
Signup and view all the flashcards
What should you do if you find tools left unattended?
What should you do if you find tools left unattended?
Signup and view all the flashcards
How do you handle tools when working with contractors?
How do you handle tools when working with contractors?
Signup and view all the flashcards
What should you do if unsure about an offender's tool authorization?
What should you do if unsure about an offender's tool authorization?
Signup and view all the flashcards
What's important for maintaining good tool control?
What's important for maintaining good tool control?
Signup and view all the flashcards
Why are hobby craft tools important to control?
Why are hobby craft tools important to control?
Signup and view all the flashcards
How are hobby craft tools authorized for offenders?
How are hobby craft tools authorized for offenders?
Signup and view all the flashcards
What's the role of cell searches regarding hobby craft tools?
What's the role of cell searches regarding hobby craft tools?
Signup and view all the flashcards
Can offenders share hobby craft tools?
Can offenders share hobby craft tools?
Signup and view all the flashcards
Where can offenders use hobby craft tools?
Where can offenders use hobby craft tools?
Signup and view all the flashcards
Study Notes
Key and Tool Control Policy
- Commissioner's Directive 573 (1992-11-01): Establishes guidelines for controlling items critical to institution safety and security, including keys, tools, hobby craft tools, communication equipment, dangerous substances (gasoline, propane, solvents), and contractor tools/equipment/keys.
- Officer Responsibility: Understanding and adhering to policies outlined in Commissioner's Directive 573, Institutional Standing Orders, and Post Orders.
- Institutional Standing Orders: Provide more specific directions tailored to each institution's security classification, facility structure, and layout.
- Post Orders: Provide even more specific directions for each post.
- Why Control is Important: Uncontrolled access to keys and tools allows for misuse, posing a threat to institutional security, safety for staff, offenders, and the public. Examples include potential escape attempts, unauthorized access to restricted areas, and facilitation of illicit activities.
- Security Classification: Risk and control measures vary based on institutional security classification (maximum, medium, minimum, multi-level). Higher classifications necessitate stricter control.
Key Control
- Key Classes: Keys are categorized for varying levels of risk:
- Prohibited (P): Critically important to safety and security, e.g., armory, armed/central control posts, communication control, and electronic security equipment areas (needs extra handling and storage procedures).
- Restricted (R): Security keys for custody and control within the institution (e.g., cell doors, movement barriers, fire doors, internal control posts, key safes, shop doors), also needs standard handling procedures but less strict than prohibited.
- Non-Restricted (N): Keys for daily operational needs with negligible misuse risk (e.g., workshop cupboards, offender accommodation, storage lockers).
- Key Types:
- Folger-Adams Key: High-security locking devices for critical areas/documents/equipment. More difficult to pick and duplicate.
- "Best" Key: For less critical areas, offering a second layer of protection; commonly used with Folger-Adams.
- Proximity Card: Electronic key; requires a "card reader" device. Allows for tracking access. Can be manually overridden in emergencies.
Tool Control
- Tool Classes: Tools are categorized based on risk:
- Non-Restricted (N): Low escape/weapon risk; generally used without direct staff supervision (e.g., wood saw, socket wrench, tape measure).
- Restricted (R): High escape/weapon risk; used by offenders under direct staff supervision (e.g., hammers, screwdrivers, hacksaw blades, pliers).
- Prohibited (P): Extremely dangerous in offenders' hands; never issued to offenders without direct supervision (e.g., knives, acetylene cutting torches, bolt cutters).
- Tool Storage: Methods include shadow boards (color-coded), tool cribs (restricted tools), secure storage (prohibited tools), individual tool kits, tool boxes/cabinets (with inventories).
Key and Tool Control Procedures
- Daily Verification: Ensure all assigned keys/tools are accounted for at the start and end of each shift, checking against inventory and recording this in shift logs.
- Key/Tool Handling: Proper handling by providing and receiving keys from authorized staff; prohibiting throwing keys.
- Security Checks: Regularly verify for open locking mechanisms/damaged devices and report immediately.
- Loss Reporting: Report missing keys or tools immediately to the appropriate authority.
- Contractor Tool Control: Authorized tools/equipment/keys; inventory before and after contractor activities. Check for extra items.
- Offender Access Restrictions: Ensure prohibited and restricted items are not accessible to offenders.
Emergency Keys
- Quick Access during Emergencies: A limited selection of emergency keys (often in a specific location or color-coded) is for speed during crises.
Dangerous Substances Control
- Control Necessary: Procedures exist for the acquisition, use, and storage of dangerous substances like gasoline, propane, solvents, etc., to maintain safety.
- Officer vigilance: Officers need to be aware of locations/people handling these substances, ensuring they are used and stored appropriately.
- Contractor Oversight: Verification tools/substances are authorized and secure.
General Guidelines
- Training Requirements: Officers must understand the specific policies and procedures for their assigned institution.
- Layered Protection: Multiple layers of security devices (and locking mechanisms involving Folger-Adams keys) are implemented to prevent escapes and control access.
- Questioning/Verification: Always check the authorization of people accessing tools or security items.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your understanding by matching various security items with their descriptions, risks, and classifications. This quiz covers key aspects of security measures within institutions, focusing on policy documents, security classifications, and critical items. Enhance your knowledge of security protocols and their implications in daily operations.