Management of Remand Detainees in South Africa - DCS-Home
Management of Remand Detainees in South Africa - DCS-Home
Management of Remand Detainees in South Africa - DCS-Home
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
6.4.2.2 Physical Security Measures<br />
Physical security measures such as walls, fences, access and exit control po<strong>in</strong>ts, etc. form the very<br />
first l<strong>in</strong>e <strong>of</strong> defence aga<strong>in</strong>st the threat <strong>of</strong> escapes. These physical measures must, however, be<br />
directly proportional to abilities and threats posed by the subject <strong>of</strong> protection.<br />
6.4.2.3 Technological Security Measures<br />
Technological security measures such as CCTV are a very important and useful <strong>in</strong> any security<br />
system to assist security personnel and managers <strong>in</strong> the effective performance <strong>of</strong> their security<br />
tasks. Technologies are also very effective to support <strong>in</strong>vestigations <strong>in</strong>to security breaches. It<br />
must, however, be emphasized that technological measures alone are very expensive and have<br />
limitations. It is important therefore that these must be utilized as part <strong>of</strong> a range <strong>of</strong> security<br />
measures (pillars) and not as standalone measures.<br />
6.4.2.4 Information Security Measures<br />
Information management allows for the cost effective deployment <strong>of</strong> all security measures. When<br />
this measure is under-utilized, implementation <strong>of</strong> other security measures tends to be either too low<br />
or too high compared with the nature and source <strong>of</strong> the threat. Accurate <strong>in</strong>formation about the<br />
threat is the key to <strong>in</strong>formed decisions and the extent <strong>of</strong> utilization <strong>of</strong> all other resources <strong>of</strong> security.<br />
6.4.2.5 Operational Security Measures<br />
It is important for any security system to be backed by a set <strong>of</strong> clear and concessive security<br />
procedures to guide staff <strong>in</strong> the day to day execution <strong>of</strong> their security duties. Given the restrictive<br />
nature <strong>of</strong> the correctional environment, the security controls <strong>in</strong> a correctional centre have to be tight.<br />
Operational security measures such as regular patrols, frequent searches <strong>of</strong> cells, <strong>in</strong>mates and<br />
other persons enter<strong>in</strong>g or leav<strong>in</strong>g correctional facilities must be clearly regulated and the<br />
procedures must spell out the circumstances <strong>in</strong> which such methods are to be used and the manner<br />
<strong>in</strong> which they are to be conducted.<br />
6.4.2.6 <strong>Management</strong> Supervision<br />
Managers and supervisors must have an <strong>in</strong> depth understand<strong>in</strong>g and knowledge <strong>of</strong> the duties they<br />
are expected to perform. They must have a clear understand<strong>in</strong>g <strong>of</strong> the operational tasks <strong>in</strong> their<br />
field <strong>of</strong> responsibility <strong>in</strong>clud<strong>in</strong>g all relevant legislation, policy and security procedures. It is<br />
imperative that each manager and supervisor be actively and visibly <strong>in</strong>volved <strong>in</strong> the management,<br />
supervision, <strong>in</strong>spection, check<strong>in</strong>g and control <strong>of</strong> his/her unit <strong>in</strong>clud<strong>in</strong>g operational guidance and<br />
support to his/her staff members.<br />
104