csc crest
spacer
 
spacer
 
spacer
 
spacer
spacer
 
spacer
 
spacer
 
spacer
  Resources
spacer
  Featured Sites
 

Receive e-mails about correctional topics
Receive e-mails about correctional topics
government logo  skip top nav
Français 
Contact Us  Help  Search Canada Site
Home Page  What's New  Research Publications  Careers
Correctional Service of Canada

Report of the Task Force on Security

Security Framework

RTF disk


Table of Contents

1. Executive Summary

2. Introduction

3. Methodology

4. Consultation

5. A Vision for the Future

5.1 SAFETY

5.1.1 Dynamic Security

5.1.2 Facility Design and Classification

5.1.3. Firearms

5.1.4. Security Information

5.1.5 Organized Crime, Gangs and Aboriginal Youth Gangs

5.1.6. Drug Strategy

5.1.7 Security Technology

5.1.8. Statutory Release / Residency

5.1.9. Security Standards and Audits

5.1.10 Institutional Threat Risk Profile

5.1.11. Cell Extractions

5.1.12. Inmate Consultation

5.2 RESPECT

5.2.1. A Culture of Respect

5.2.2. C.S.C.'s Role with Respect to Victims

5.2.3. Role of the Correctional Officer

5.2.4. Uniforms

5.2.5. Trust, Values, Attitudes, and Ethics

5.2.6. Assisting Staff with Personal and Family Problems

5.2.7. Facility Improvements

5.2.8. Staff Empowerment

5.2.9. Special Employer Status

5.3 LEADERSHIP

5.3.1 Senior Management

5.3.2 Middle Management

5.3.3. The CAPRA Problem Solving Model

5.3.4. Use of Force Management Model

5.3.5. Leadership and the Mission

5.3.6. Law and Policy

5.3.7. Professionalism

5.3.8. Visible Leadership Style

5.3.9. Labour/Management Relationships

5.3.10. Leadership Outside of CSC

5.4 Learning

5.4.1. Our History

5.4.2. Career Progression

5.4.3. General Orientation to Security Procedures

5.4.4. Aboriginal Issues

5.4.5. Facilities for Federally Sentenced Women

5.4.6. Qualification Standards and Continuous Learning

5.4.7. Recruitment and Selection

5.4.8. Staff Retention

5.4.9. Induction Training

5.4.10. Specialized Training for Female Staff Members

5.4.11. Communicating

5.4.12. Research in Security

6. Implementation

7. Conclusion

8. List of Recommendations

top