Types of Procedures in Prisons Research Paper

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Introduction

An individual goes through several procedures when he/she gets into prison. These procedures include correctional, organizational, and administrative.

The receiving process

The booking process involves procedures such as recording the name of the suspect and the reasons for the arrest. Police would then take a mug shot for records. This step also helps in determining whether any other individuals with same name as the one arrested are registered in the police database. The next step involves taking personal property and clothing of the suspect for safe custody by the police. The officers then scan the fingerprints of the suspect and the information is noted down in the police database. The suspect then undergoes a thorough full body search, which at times may involves stripping as a caution against any drugs or weapons being brought into the custody or prison (Bergman and Berman 13). The officers then check with their records or files to determine if the suspect has any other pending charges to determine whether the suspect qualifies for a bail. They carry out tests on the suspect to detect any sensitive infections or diseases as a way of protecting other inmates and prison officers against communicable infections. A DNA sample test is required at times.

Release process

Release of prisoners occurs after going through corrective measures. They would return all the prison uniforms that they posses and get the clothes they were putting on during the arrest back. The suspects would then sign for the clothes returned to them as a confirmation for receipt. They also sign any other relevant documents before release after which, they would be escorted to the reception or waiting area.

Correctional Environmental Function

Carefully chosen locations within the prison have closed circuit television cameras to help the officers identify any prisoner who may break any policies or rules. Federal prisons also regularly do drug tests to prisoners by taking samples from their saliva, sweat, urine, and hair. This may be either voluntarily or forced. Some of the methods used in prisons include biometrics, which uses the technology of detecting the prisoners’ fingerprints, retinas, among other parts of the body. Very high frequency radios track the whereabouts of prisoners through communication between officers whenever the need arises. The prison officers also ensure they detect and confiscate any weapons or objects from prisoners to avoid any harm that may occur. Prisoners and their visitors go through serious search using metal detectors to prevent any use of weapons against guards or prisoners.

Carrying out of regular searches at any time and place within the prison is a common practice to find out any illegal item that could have been smuggled into the prison. Separation of prisoners considered more dangerous into special sections also occur in prisons (Gendreau and Kuhns 11).The officers open and search all letters delivered to the prisoners and in some cases read them. This prevents discussion of any suspicious activity, directly or in coded language. There is emphasis on the use of both punishments and rewards in managing the behaviors of inmates. The rewards are used more to encourage positive behavior. Punishment of the prisoners is used with the aim of correcting their bad habits and behaviors. The prisons need finances so that their many operations can run smoothly without hitches after they leave prison. They must have budgets and financial policies to ensure they have support and accommodation after the release not to get involved in criminal activities, such as robbery. Most of the funding usually comes from the state (Gendreau and Kuhns 88).

Works Cited

Bergman, Paul, and Sara Berman. The Criminal Law Handbook. Nolo, 2013. Print.

Gendreau, Paul, Shelley. J. Listwan, and Joseph.B Kuhns. Managing Prisons Effectively: The Potential of Contingency Management Programs. Ottawa: Public Safety Canada, 2011. Print.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, April 5). Types of Procedures in Prisons. https://ivypanda.com/essays/types-of-procedures-in-prisons/

Work Cited

"Types of Procedures in Prisons." IvyPanda, 5 Apr. 2022, ivypanda.com/essays/types-of-procedures-in-prisons/.

References

IvyPanda. (2022) 'Types of Procedures in Prisons'. 5 April.

References

IvyPanda. 2022. "Types of Procedures in Prisons." April 5, 2022. https://ivypanda.com/essays/types-of-procedures-in-prisons/.

1. IvyPanda. "Types of Procedures in Prisons." April 5, 2022. https://ivypanda.com/essays/types-of-procedures-in-prisons/.


Bibliography


IvyPanda. "Types of Procedures in Prisons." April 5, 2022. https://ivypanda.com/essays/types-of-procedures-in-prisons/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1