PRISON SECURITY DYNAMICS

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

Correctional Certification Subpart 1. Purpose: establish program certification requirements that govern facilities providing correctional program.
Key and Lock Control, Version 4
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Emergency Action Plans
Escape Procedures Nevada Department of Corrections – Training Division.
In-depth look at ISACS Stockpile Management: Weapons Photo: MAG.
Restrictive Procedures Certification Certification required. A license holder who wishes to use a restrictive procedure with a resident must.
National Committee for the Certification of Radiation Protection Officer SAFETY AND WORK PROCEDURE IN SALES OF RADIOACTIVE MATERIAL AND IRRADIATING APPARATUS.
SECLUSION AND RESTRAINT PROVISIONS Marion Greenfield.
Top 10 Security-Related Discrepancies ///MARSEC Corporation.
TOMPKINS COUNTY JAIL ORIENTATION SEMINAR Tompkins County Sheriff’s Office Sheriff Peter J. Meskill Chief of Corrections Debra Niemi.
Effective Workplace Safety Inspections OFFICE OF RISK MANAGEMENT LOSS PREVENTION UNIT.
Isolation of Hazardous Energy Understanding the Requirement of Lockout Tagout 29 CFR
Responsible CarE® Employee health and Safety Code David Sandidge Director, Responsible Care American Chemistry Council June 2010.
1 Perimeter Security System. 2 Performance Objectives 1. List the four key duty posts of the Perimeter Security System. 2. Explain the purpose of perimeter.
Employee Emergency Action Plans and Exit Routes Training Program.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
EGRESS AND FIRE PROTECTION
West Virginia University Laboratory Training Module 1. OSHA Laboratory Standard.
Patient Belongings and Valuables for C1 Mental Health Patients Stacey Sands BSN, RN Kelly Thompson BSN, RN-BC December 2012.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
Safety and Health Program Section B of the Forest Activities Code.
Levels of safety Priorities for eliminating hazards in the workplace Eliminate the hazard through the machine design stage Apply safeguarding technology.
Mobile Audio/Video Recording Equipment Policy and Procedure Number PP
Information Systems Security Operational Control for Information Security.
ADMISSION OF OFFENDERS IN CORRECTIONAL CENTRES. INDEX 1.Purpose of the presentation 2.Aspects regarding admission Identification Filing and safe-keeping.
Searches in Corrections. Authority AR 422 NRS NRS NRS
ISO/IEC 27001:2013 Annex A.8 Asset management
Texas Law Enforcement Best Practices Mid Year Training Conference.
FOOD SERVICE Correctional Services. Copyright and Terms of Service Copyright © Texas Education Agency, These materials are copyrighted © and trademarked.
Department of Corrections Critical Response and Emergency Response Manual DON’T LEARN SAFETY BY ACCIDENT!!
Health & Safety Management “and a few other things for your consideration”
Searches in Corrections. Contraband: noun: contraband 1. goods that have been imported or exported illegally. "the police looked for drugs, guns, and.
Storage, Labeling, Controlled Medications Guidance Training CFR § (b)(2)(3)(d)(e) F431.
- HEMIC Facility Inspections. Common Losses A fire breaks out in a 16 story office building An employee had the tips of two fingers amputated Could these.
Protecting Houses of Worship Security Plan Development Considerations Glenn Moore Protective Security Advisor – Oklahoma District National Protection and.
Responsibilities of Sponsor, Investigator and Monitor
Unit 1: Protecting the Facility (Virtual Machines)
Exit Routes, Emergency Action Plans, Fire Prevention Plans, and Fire Protection.
Lock Out Tag Out (LOTO).
Non-Compliance Behaviors General Overview of Physical Restraint Requirements for Public Education Programs Prepared by the Massachusetts Department of.
Responsibilities of Sponsor, Investigator and Monitor
Medina District Safety Plan.
TWIC Training & Maritime Security Awareness
Controller and Evaluator Briefing
Administrative Practices Outcome 1
Vessels and Facilities that are Temporarily Out of Service or Laid-up
Banks Logo Emergency Procedures.
Clinical Engineering Lecture (3).
Safety and Security of Radiation Sources
Hamilton County Sheriff’s Office
Introduction In the first lesson we demonstrated the following:-
Clinical Alarm Systems - NPSG Goal # 6 -
Managing Property What Principal Investigators and Business Officers need to know Business Services - Rates and Review Team Established February 25, 2015.
Safety is part of our culture at Halliburton
Top 10 Security-Related Discrepancies
Federal Protective Service
County HIPAA Review All Rights Reserved 2002.
General Requirements of NFPA 101
Contents subject to change.
Unit 101 Element 4 Maintain a Secure environment for customers, staff and visitors. Maintaining effective security should be the concern of everyone working.
Prevention through planning, control and monitoring Harold Chinogurei
Locking and Unlocking encounters
What Is Workplace Violence?
Managing Property What Principal Investigators and Business Officers need to know Business Services - Rates and Review Team Established February 25, 2015.
Virginia Sheriffs’ Institute New Sheriff Orientation
Whose Job Is It? Responsibility for Laboratory Safety and Security
Capital Assets Through the Eyes of an Auditor
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Presentation transcript:

PRISON SECURITY DYNAMICS BY SP. GEORGE OUKO KENYA POLICE SERVICE.

Learning Outcomes At the end of the module the participant should have an understanding of prison security dynamics; To demonstrate an enhanced understanding of the importance of effective keys and tool control in the prisons.

Structure of Presentation Introduction Key and tool control Interaction with prisoners Inmate safety and security Searches Challenges Conclusion

Introduction Effective control of keys is one of the most essential security elements of any correctional operation, regardless of security level. In order to maintain effective security, the staff must control the doors, gates, and other locking devices that comprise physical security both inside and outside the perimeter

Cont The security of an institution depends on effective key control; Its compromise may pose a threat to the safety of inmates, staff and the general public.

Basic Jail Security Procedures An effective jail security plan will include: Admission of the inmate Escorting inmates to court, medical appointments, funeral homes, hospitals  and other jails or institutions Counts Release procedures Control of drugs and medications

Cont. Use and maintenance of security equipment Control of contraband Tool and key control Development of security policies, plans, and procedures

Gate keeping This involves controlled movement and maintaining prison security by providing guide lines and procedures for the operation of the main gate.

Gates should be managed by experienced and well trained officers. The officer assigned should verify through peep hole to identify any person outside the gate before opening. All visitors should be searched upon entering the facility. He should ensure that no unauthorized persons get in or out of the main get.

Items brought in for the in mates should be properly checked for any contrabands. Vehicles entering and leaving the facility must be properly checked Visitors names should be entered in the gate log. No weapons should be carried into the facility without the permission of the officer in charge. No unauthorized properties should leave or enter the facility.

Key Systems

Keys system There shall be two key safes – main key safe and duplicate key safe. Main set of keys should be used in the daily operation and the duplicate set of keys shall be kept in the office of the head of the institution.

Cont A key log shall be maintained in the security office of all the keys in the facility. Each set of keys shall be labeled and hanged on a separated corresponding hook. No keys shall be taken out without authorization of officer in charge of the facility.

Listing of every key in the institution The list of the number of key in each ring. The trade name of each key and the lock it fits. The location of the locks. The code number of the ring on which it is located. During final lock up the key to the main key safe shall be sealed and kept by the senior most officer on night duty.

Tool Control Effective tool control prevents their use as weapons and in escape attempts. As with keys, account for all tools at each shift change.

Tool Classification While it may be difficult to classify every specific tool used in the facility, all tools should be categorized by classification as hazardous or non- hazardous The classification scheme for tools will vary by facility depending upon the Security level of the facility. A general guide for classifications is as follows:

Hazardous-Class A Hazardous or Class A tools are tools that can be used by inmates either in effecting an escape or causing death or serious injury to staff or other inmates. These tools generally include but are not limited to the following

Examples of Class A tools Metal Cutting Blades Bolt Cutters Core Drills Ladders Jacks Hacksaw Blades Pipe Knives Metal Cutting Equipment

Cont Wire Cutters Files Cutting Torch and Cutting Tips Pipe Cutters and Bolt Cutters Axes and Drill Bits Portable Grinders or Similar Machines Other tools, such as scissors

Non-Hazardous-Class B. Non-hazardous tools will be considered as Class B tools and will be subject to less restriction than Class A tools. Tools in this category normally do not pose a direct threat to the security of the facility but do require accountably and control  

Tool Control Techniques All institution staff are responsible for tool control. Tool control is maintained through proper MARKING, STORAGE, and INVENTORIES AND ACCESS. ALL new tools must be marked according to the assigned class as defined in the Correctional Services manual.

Tool Identification And Marking All tools are marked in each work location with an identification symbol identifying the department or detail. The Tool Control Officer is responsible for assuring the correct markings. Tools which cannot be marked are inventoried and kept locked. In addition Class A tools are marked as to the storage location.  

Tool Control and Use All tools must be closely supervised and monitored. Tools are to be checked in and out on a check-out log. Class A tools pose an imminent threat to the facility and must be used under the supervision of an appropriate employee. When not in use, Class A tools shall be securely stored. Where feasible, this should be outside the secure perimeter of the facility

Cont Class B tools should be used under the supervision of an appropriate employee. Class B tools may be stored within the secure perimeter in a secure location.  

Disposition of Tools.   Tools broken or worn beyond use will require proper disposal. Upon disposal, responsible staff must document and make adjustments to the inventory and advise other accountable staff. Annual evaluations should occur to identify tools infrequently used or no longer needed with consideration given to moving these tools to an area outside the perimeter of the institution.

Interaction with Prisoners Visibility Staff presence sends out several messages to the inmate population that staff are interested, available, and responsive and; that they are maintaining constant surveillance of the facility. Staff can respond to concerns, deficiencies and problems before they escalate to crisis.

Communication   Communication serves as the “lifeblood” of any organization and is especially critical in a prison. Through constant and effective communications with inmates, staffs stay informed and can react to problems before they escalate  

Inmates Observation/Supervision Being observant is paramount in maintaining a secure and safe correctional facility. Inmate’s observation is the ability of the correctional staff to supervise inmates 24 hours a day, 7 days a week, and 365 days in a year.

Reasons for Inmates’ Observation Ensure security and good order. Ensure early detection of infractions of correctional discipline. Ensure inmates’ accountability. Observed changes in inmates’ behavior and environment can be closely monitored.

What are the challenges?

Challenges The lack of security Inhuman conditions due to lack of appropriate infrastructure Insufficient budgetary provisions Lack of professional staff.

Conclusion key and tool control is vital to the security of the institution. If we do lose control of a key or tool, your safety, the safety of other staff members, the community and inmates are compromised. As stated earlier, we are all responsible for key and tool control.

Questions.