28.11.2012 Views

Management of Remand Detainees in South Africa - DCS-Home

Management of Remand Detainees in South Africa - DCS-Home

Management of Remand Detainees in South Africa - DCS-Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.4.2.2 Physical Security Measures<br />

Physical security measures such as walls, fences, access and exit control po<strong>in</strong>ts, etc. form the very<br />

first l<strong>in</strong>e <strong>of</strong> defence aga<strong>in</strong>st the threat <strong>of</strong> escapes. These physical measures must, however, be<br />

directly proportional to abilities and threats posed by the subject <strong>of</strong> protection.<br />

6.4.2.3 Technological Security Measures<br />

Technological security measures such as CCTV are a very important and useful <strong>in</strong> any security<br />

system to assist security personnel and managers <strong>in</strong> the effective performance <strong>of</strong> their security<br />

tasks. Technologies are also very effective to support <strong>in</strong>vestigations <strong>in</strong>to security breaches. It<br />

must, however, be emphasized that technological measures alone are very expensive and have<br />

limitations. It is important therefore that these must be utilized as part <strong>of</strong> a range <strong>of</strong> security<br />

measures (pillars) and not as standalone measures.<br />

6.4.2.4 Information Security Measures<br />

Information management allows for the cost effective deployment <strong>of</strong> all security measures. When<br />

this measure is under-utilized, implementation <strong>of</strong> other security measures tends to be either too low<br />

or too high compared with the nature and source <strong>of</strong> the threat. Accurate <strong>in</strong>formation about the<br />

threat is the key to <strong>in</strong>formed decisions and the extent <strong>of</strong> utilization <strong>of</strong> all other resources <strong>of</strong> security.<br />

6.4.2.5 Operational Security Measures<br />

It is important for any security system to be backed by a set <strong>of</strong> clear and concessive security<br />

procedures to guide staff <strong>in</strong> the day to day execution <strong>of</strong> their security duties. Given the restrictive<br />

nature <strong>of</strong> the correctional environment, the security controls <strong>in</strong> a correctional centre have to be tight.<br />

Operational security measures such as regular patrols, frequent searches <strong>of</strong> cells, <strong>in</strong>mates and<br />

other persons enter<strong>in</strong>g or leav<strong>in</strong>g correctional facilities must be clearly regulated and the<br />

procedures must spell out the circumstances <strong>in</strong> which such methods are to be used and the manner<br />

<strong>in</strong> which they are to be conducted.<br />

6.4.2.6 <strong>Management</strong> Supervision<br />

Managers and supervisors must have an <strong>in</strong> depth understand<strong>in</strong>g and knowledge <strong>of</strong> the duties they<br />

are expected to perform. They must have a clear understand<strong>in</strong>g <strong>of</strong> the operational tasks <strong>in</strong> their<br />

field <strong>of</strong> responsibility <strong>in</strong>clud<strong>in</strong>g all relevant legislation, policy and security procedures. It is<br />

imperative that each manager and supervisor be actively and visibly <strong>in</strong>volved <strong>in</strong> the management,<br />

supervision, <strong>in</strong>spection, check<strong>in</strong>g and control <strong>of</strong> his/her unit <strong>in</strong>clud<strong>in</strong>g operational guidance and<br />

support to his/her staff members.<br />

104

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!