html5-img
1 / 21

Responding to the challenges

Responding to the challenges. Secure perimeter Active management/dynamic interpersonal security Enhanced crime prevention and security crime prevention officers and analysis telephone monitoring information sharing Enhanced electronic security and systems

junior
Download Presentation

Responding to the challenges

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Responding to the challenges • Secure perimeter • Active management/dynamic interpersonal security • Enhanced crime prevention and security • crime prevention officers and analysis • telephone monitoring • information sharing • Enhanced electronic security and systems • Revised prisoner security classification • Enhanced information systems

  2. Security systems • Electronic security and associated systems are tools used to maintain security (e.g. preventing escapes) while providing a safe living and working environment within the prison environment

  3. Electronic systems • Systems include: • cameras • perimeter detection • keyless entry • powered fences • emergency remote control of key utilities • cell alarms/intercoms • distress alarms

  4. Fence with detection

  5. Fence with detection

  6. Perimeter wall with detection

  7. Powered fence

  8. Standard control room

  9. But… • Requirements will vary from jurisdiction to jurisdiction – so your solutions may be different to ours – but the methodology you will use to derive your solutions is likely to be largely the same as ours

  10. Standard systems • Aligning standardised electronic and security systems with your infrastructure design can provide: • consistency of systems operation across all prisons • standardisation of training • enhanced usability, reliability and performance • easier maintenance and bulk purchasing benefits • reduced operational and staffing costs • overall cost-effectiveness

  11. Security Classification • To support a normalised environment we are developing a prisoner classification system which: • protects public, staff and prisoners • accommodates prisoners at lowest security level practicable • differentiates between internal and external risk to enable prisoners of different security classifications to associate safely within the prison

  12. Information technology • The Department uses a corrections-specific application (IOMS) to manage all offender-related information in an integrated manner across all Services • Specifically in regard to the prison service, IOMS provides the following functionality: • reception (separate slide for each function) • assessment • sentence management • release

  13. Benefits of IOMS • Offender information is available to all staff in all locations • Ready access to information allows for more effective management of offenders and reduces risk to both offenders and staff • Allows Department to meet its obligations in terms of sentence/offender management and provision of information (including information sharing) • Supports robust analysis and monitoring

  14. Summary • Combining good infrastructure planning and design with effective use of security systems and the application of information technology has made a major contribution to achieving the Department’s outcomes of protecting the public and reducing re-offending

  15. Concluding remarks • The NZ experience suggests you should aim to: • align your strategy, planning and design with what’s feasible, the outcome you want to achieve and your local conditions • consider long term sustainability, maintainability and future-proofing • balance your information/security technology, build design and operational practice to be able to manage prisoners in most cost effective manner

  16. Questions

More Related