Evaluation Report: Institutional security, 2015

Evaluation Report

File #394-2-95

Evaluation Report: Institutional Security

Evaluation Division
Policy Sector
February 2015

Signatures

Evaluation of CSC’s Institutional Security

__
Don Head
Commissioner

_
Date

_
Mark Nafekh
Executive Director, Evaluation Division

__
Date

Contributions

Authors:

Kelly E. Morton Bourgon

Bertha May

Lysiane Paquin-Marseille

Elizabeth Loree

With contributions from:

Bernard Marquis

Irene Roberts

David Hubka

Joel Ndayubaha

Adam Crawford

Sean Horne

Brittany MacDonald

Colleen MacDonald

Terri-Lynne Scott

Acknowledgments

The evaluation team would like to express its appreciation to the many people who contributed to this evaluation and provided valuable information on institutional security.

First, we would like to thank the many institutional managers, staff members, and offenders who took the time to participate in the interviews held at various institutions. We would also like to thank the institutional management and staff members who participated in a number of questionnaires. In addition, we want to thank the staff at National Headquarters and Regional Headquarters, as well as people from a number of Correctional Service Canada’s (CSC) partner organizations who participated in interviews.

The team greatly appreciates the assistance and input provided by CSC’s Security Branch, including the Preventive Security and Intelligence Division, the Departmental Security Division, as well as the Security Operations Division.

We would also like to thank the many branches and sectors of CSC who helped provide data for this evaluation, including the staff in Financial Management Services in the Comptroller’s Branch who provided financial data, the staff in Performance Management who provided assistance with incident data from Performance Direct, staff from Strategies, Planning, Measurement and Reporting who provided human resource data, and the Labour Relations Branch for internal CSC data. Additionally, we would like to thank Employment and Social Development Canada for providing data on complaints and work refusals under the Canada Labour Code.

The team would also like to thank the Internal Audit Sector and the Research Branch, who provided us with additional information from their audits and research reports.

Other groups within CSC who provided valuable information and advice include the Human Resources Planning, Reporting and Systems Directorate, the Learning and Development Branch, in particular staff in the Implementation of National Learning Programs, Partnership and Infrastructure Division, the Facilities Branch, and the Schedules and SDS Division.

The team would also like to express our thanks to the Union of Canadian Correctional Officers.

We would also like to extend our thanks to all those in the Evaluation Division who contributed to this evaluation, by conducting interviews, coding data or reviewing drafts of the report.

Finally, the evaluation team would like to thank everyone else who contributed to this evaluation, whose names do not appear here.

Executive Summary

Institutional security is relevant and responsive to the daily operations of correctional institutions and to the safety and security of all Canadians. Institutional security activities, as legislated by the Corrections and Conditional Release Act (1992), align with the federal government’s new legislations such as the Safe Streets and Communities Act (2012). Institutional security activities also support the federal government and Correctional Service Canada’s strategic priorities.

The evaluation was conducted in accordance with the Treasury Board’s Policy on Evaluation (TBS, 2009) and the Evaluation Division’s Five-Year Plan. The scope of the evaluation was determined through a number of activities aimed at identifying evaluation priorities. As such, the evaluation focused on three key components: 1) Human Resource Management and Staff Safety; 2) Preventive Security and Intelligence; and 3) Institutional Security Operations. The evaluation incorporated both qualitative and quantitative data collection and analysis methods.

Component 1 - Human Resource Management and Staff Safety

Human resource management and staff safety is essential to operating a safe and secure correctional institution. The evaluation examined issues identified by institutional staff as they perform their security related duties. The topics that emerged from the analyses included: recruiting appropriate candidates; staff experience and development; staffing and deployment levels; and staff safety concerns. Recommendations focussed on tracking and monitoring new recruits; on-the-job coaching for new Correctional Officers (CO) and Primary Workers (PW); and enhancing communication and information sharing as part of the Employee Protection Protocol (EPP). Management Action Plans (MAP) addressing the issues were presented and approved. The MAPs will ensure tracking and monitoring of new recruits; the development of a standardized framework for on-the-job coaching for new COs and PWs; and the appropriate and timely provision of information and services throughout the EPP process to persons threatened.

Component 2 - Preventive Security and Intelligence

Intelligence information contributes to institutional safety and security by preventing security incidents, eliminating illegal activities and supporting the offender case management process. The evidence centered on the gathering, development and communication of intelligence information. It was recommended that tools be provided to Security Intelligence Officers to engage and debrief staff, and that there be monitoring and reporting on the production and sharing of intelligence. A MAP addressing the issues was presented and approved. The MAP focused on streamlining and restructuring the Intelligence Program.

Component 3 - Institutional Security Operations

The evaluation investigated daily operational security activities and how they contribute to a safe and secure institutional environment. The finding developed from the examination of evidence was that dynamic security is apparent and it is making a contribution to the safety and security of the institutions.

Financial data were examined along with incident, staff and offender data. The rate of institutional security-related spending remained relatively stable from 2008/2009 to 2013/2014 despite an increase in the number of CX staffFootnote 1 and offenders in CSC institutions. The analyses also showed a decrease in serious security incidents and escapes, an increase in drug-related seizures and an increase in negative urinalysis results.

List of Key Findings

Finding 1: Relevance

CSC’s institutional security activities continue to be relevant. Specifically, these activities align with the federal government roles and responsibilities, support the priorities of the federal government and CSC, and are responsive to the needs of Canadians.

Finding 2: Recruitment

Issues were reported with the CX recruitment processes which were most commonly associated with the selection and identification of CX candidates with appropriate experience and personal suitability. The implications of these issues were noted as barriers to effective institutional security. However, the recent implementation of an enhanced CX recruitment process has demonstrated positive results with regards to addressing the identified gaps.

Finding 3: Experience

Lack of experience among CX staff members was found to be associated with higher levels of security incidents and security related offender grievances. Although recent strategies may help mitigate the associated security risks, research shows that mentoring and coaching initiatives may also help increase knowledge and skills attained through experience.

Finding 4: Staffing and Deployment

Many evaluation respondents reported issues with insufficient staffing and deployment levels. Nevertheless, an examination of staff complaints and refusals to work revealed that one tenth were related to deployment issues, and one percent resulted in a ruling supporting the presence of risks to staff safety.

Finding 5: Employee Protection Protocol

There is a reported need for the Employee Protection Protocol (EPP) to address institutional staff members’ safety concerns and issues impacting security operations. However, issues related to communication and inadequate security measures were reported by EPP client questionnaire respondents.

Finding 6: Preventive Security and Intelligence

Intelligence is important to maintaining the safety and security of institutions; however, various challenges were reported in the areas of gathering and developing intelligence and communicating intelligence information.

Finding 7: Dynamic Security

Dynamic security is being conducted and contributes to the safety and security of correctional institutions.

Finding 8: Financial Impact

While spending on Institutional Security remained relatively stable, rates of escapes and serious security incidents have decreased, suggesting a cost-efficiency for CSC. In addition, several areas of opportunity were identified to further enhance the cost-efficiency of CSC’s institutional security activities, as well as the overall safety and security of staff and offenders in CSC’s institutions.

List of Key Recommendations

Recommendation 1: Recruitment

CSC should track and monitor the performance of new CXs through the recruitment, training and probation phases to ensure the appropriate candidates are hired and retained, and that the process is improving the organization’s ability to successfully meet safety and security requirements. Monitoring should be done on outcomes such as: success during training and while on probation, disciplinary actions, terminations, promotion, retention, and ability of the process to meet required capacity.

Recommendation 2: Experience

CSC should enhance the transition of new Correctional Officers by strengthening the links between new recruits and the sites which they are assigned to. This should be facilitated through the development, implementation and monitoring of a standardized approach for on-the-job coaching for new CXs and ensure there is a sound institutional capacity to deliver these initiatives.

Recommendation 3: Employee Protection Protocol

The Employee Protection Protocol (EPP) should be supported and improved through tools and processes which enhance communication and the sharing of information. Processes and tools should ensure staff members receive appropriate and timely communication of information and services, and there is appropriate monitoring and follow up regarding the employee’s safety.

Recommendation 4: Preventive Security and Intelligence

The Preventive Security and Intelligence Division should ensure the tools provided to SIOs are used to engage and debrief staff and management, and improve the gathering, development and communication of intelligence. This should be achieved through consistent, timely, and standardized monitoring and reporting of the production and sharing of intelligence.

Management Action Plan Overview

Management Action Plan 1: Recruitment

The Management Action Plan (MAP) will ensure that recruits are tracked and monitored for 12 months. There will also be a review and update national selection criteria and tools used to promote CXs to the CM level. Additionally, national standards and guidelines for the recruitment, training and performance management of Correctional Officers (COs) and Primary Workers (PWs) will implemented, monitored and adjusted, as required.

Management Action Plan 2: Experience

The MAP will include the development of a standardized framework for on-the-job coaching for new COs and PWs. Additionally, a Middle Manager Mentoring Program (MMMP) will be implemented and the Management Development Portal will be launched.

Management Action Plan 3: Employee Protection Protocol (EPP)

The MAP contains an action that will ensure the appropriate and timely provision of information and services to persons threatened. Staff safety will also be monitored and followed-up on by supporting and improving the EPP through new tools and processes.

Management Action Plan 4: Preventive Security and Intelligence

The Intelligence Program will be streamlined and restructured. The Intelligence Program will be supported and improved through the use of intelligence systems, tools and assets. Communication and intelligence information sharing with key CSC clients, stakeholders and operational and senior managers will be increased. Additionally, communication will be enhanced to create collaboration and liaison with external partners and stakeholders by re-establishing local, regional and national intelligence committees.

Table of Contents

List of Tables

List of Figures

List of Acronyms

CC
Cost Centre
CCRA
Corrections and Conditional Release Act
CD
Commissioner’s Directive
CISM
Critical Incident Stress Management
CLC
Canada Labour Code
CM
Correctional Manager
CO
Correctional Officer
COMO
Cost of Maintaining an Offender
CSC
Correctional Service Canada
CTP
Correctional Training Program
CX
Correctional Services Occupational Group
DSD
Departmental Security Division
EAP
Employee Assistance Program
EPP
Employee Protection Protocol
ESS
Enhanced Suitability Screening
ESDC
Employment and Social Development Canada
HRMS
Human Resource Management System
IFMMS
Integrated Financial and Material Management System
KLC
Key Leadership Competencies
L&D
Learning and Development
MAP
Management Action Plan
NHQ
National Headquarters
NTS
National Training Standards
OJT
On-the-Job Training
OMS
Offender Management System
OPI
Office of Primary Interest
PAA
Program Alignment Architecture
PO
Parole Officer
PW
Primary Worker
RHQ
Regional Headquarters
SDS
Scheduling and Deployment System
SIA
Security Intelligence Analyst
SIAM
Strategic Intelligence Analysis and Monitoring Division
SIO
Security Intelligence Officer
SITREP
Situation Reports
SOR
Statement Observation Reports
SSP
Standardized Selection Process
STG
Security Threat Groups
TBS
Treasury Board of Canada Secretariat
TRA
Threat and Risk Assessment
UCCO
Union of Canadian Correctional Officers

1.0 Introduction

In accordance with the Five-Year Evaluation Plan, the Correctional Service Canada (CSC)Footnote 2 conducted an evaluation of institutional security. The evaluation process followed the Treasury Board of Canada Secretariat’s (TBS) Policy on Evaluation (2009), by examining the continued relevance of the institutional security activities and their alignment with CSC and federal government priorities, roles and responsibilities, as well as CSC’s performance in delivering institutional security activities, including effectiveness, efficiency and economy. Effective institutional security allows CSC to mitigate potential risks, such as the Corporate Risk that "CSC will not be able to maintain required levels of operational safety and security" (CSC, 2013b, p. 11), and strengthens CSC’s ability to handle challenges related to this risk. As such, this evaluation identifies what challenges exist, and provides recommendations on how CSC can continue to meet its priority of the "safety and security of staff and offenders in our institutions and in the community" (CSC, 2013b, p. 7). Additionally, the evaluation results and recommendations contained in this report will assist CSC’s senior management with strategic policy and investment decision-making regarding institutional security.

1.0 Program Profile

1.1 Background

In 2001, the CSC Task Force on Security developed a Security Framework to optimize staff and offender interactions and promote safe reintegration. The framework contained four components: safety, respect, leadership and learning, as well as 80 recommendations that aimed to advance CSC as a "professional, humane and restorative correctional system" (CSC, 2001, p. 1). For example, recommendation #19 advised "that CSC develop a framework and standards for the gathering and analysis of security information" (CSC, 2001, p. 96), and recommendation #33 advised "that CSC standardize and fully communicate the implementation of approved security technologies" (p. 97). Many of the recommendations from the Report of the Task Force on Security have been implemented.

In 2007, a CSC Review Panel produced A Roadmap to Strengthening Public Safety which outlined 109 recommendations, mostly in the area of institutional security. Some of these recommendations were addressed through changes following the Safe Streets and Communities Act (2012; e.g. The Roadmap recommended the inclusion of an "offender accountabilities" section in the Corrections and Conditional Release Act [CCRA, 1992] which was completed with the amendment of CCRA section 4(h), a principle guiding offender behaviour). In addition, five key recommendations from the Panel have been outlined in the Transformation Agenda Report on Safety and Security Initiatives (CSC, 2010b, p. 4):

1.2 Policy and Legislation

The CCRA (1992) provides CSC with the legislative mandate to contribute to public safety by administering court imposed sentences through safe custody and supervision of offenders. Institutional security activities are an essential aspect of how CSC provides a safe and secure working and living environment in correctional facilities across Canada for staff members, offenders, and the broader Canadian public. Specifically, these activities contribute to the safety of correctional institutions by supporting the prevention of security incidents. This is accomplished through the management of offender populations, the continuous surveillance and monitoring of institutional environments, and the on-going assessment of threats and risks informed by the collection and analysis of intelligence information. Institutional security activities thereby promote a positive institutional environment which supports offender reintegration.

Recently, sections 3.1 and 4Footnote 3 of the CCRA were updated as per section 54 of the Safe Streets and Communities Act (2012). In addition to the CCRA, CSC’s institutional security is affected by various other federal legislations, such as the Criminal Code and the Canada Labour Code – as well as by internal CSC directives and policies, such as the Commissioner’s Directive (CD) 560 – Dynamic Security and Supervision. CSC operations, including institutional security activities, are also impacted by such legislation as the Truth in Sentencing Act, and Abolition of Early Parole Act, as well as by recent deficit reduction activities.

Institutional security activities are a sub-activity of CSC's Custody Program, as defined by the Departmental Program Alignment Architecture (PAA; see Appendix AFootnote 4). These activities, along with correctional interventions, community supervision, and internal services, allow CSC to contribute to the public safety of all Canadians.

1.3 Program Description

For the purposes of this evaluation, institutional security was separated into three key components: 1) Human Resource Management and Staff Safety; 2) Preventive Security and Intelligence; and 3) Institutional Security Operations. Together, these three components encompass a wide array of activities that pertain to the successful implementation of policies and procedures designed to:

1.4 Logic Model

A logic model is a schematic representation of the essential components of a program (Posavac & Carey, 1992). It connects the program activities to outputs and outcomes. Specific activities and sub-activities within the logic model were reorganized and integrated to better fit the scope of the evaluation. For further details, see Appendix B and Appendix C for the Institutional Security Logic Model.

1.5 Governance Structure

CSC’s Commissioner has the ultimate responsibility for institutional security. However, daily security operations within CSC institutions are the responsibility of the Security Branch. The Assistant Commissioner, Correctional Operations and Programs reports to the Commissioner, and is responsible for the Security Branch.

2.0 Evaluation Method

2.1 Scope of the Evaluation

The scope of the evaluation was determined through a number of activities aimed at identifying evaluation priorities, including:

The scope of the evaluation was further refined through consultation with the Offices of Primary Interest (OPI) and key stakeholders which assisted in identifying the evaluation priorities within the three components.Footnote 5 A description of each component as well as associated expected results is provided below.

2.1.1 Component 1: Human Resource Management and Staff Safety

The evaluation questions related to human resource management and staff safety touched upon the various challenges that may exist when managing and conducting institutional security activities. Specifically, the questions focussed on how the following themes are related to staff safety and security: staffing activities; training and knowledge dissemination; conflict resolution mechanisms; and the Employee Protection Protocol (EPP). These themes contribute to the safety and security of staff, offenders, and the institutions through the hiring of the right people, ensuring that staff develop essential experience, that posts are adequately filled, and protocols are implemented that deal with threats against employees.

Human resource management and staff safety is conducted by staff and management at the following branches:

2.1.2 Component 2: Preventive Security and Intelligence

The evaluation questions related to preventive security and intelligence centred around how intelligence activities are meeting their planned results by examining how information sharing contributes to the identification of security issues. Intelligence contributes to a safe and secure environment for staff members and offenders in CSC institutions and the community, although in this evaluation the focus is solely on the security within the institutions. Specifically, intelligence information, gathered through investigations, staff observations and reporting, information from outside sources (e.g. police) and also through interactions with offenders, is used in the prevention of security incidents, eradication of illegal activities, and supports the case management process.

The Intelligence Program is conducted primarily through Security Intelligence Officers (SIO) and Security Intelligence Analysts (SIA):

2.1.3 Component 3: Institutional Security Operations

The evaluation questions focussing on institutional security operations examined how daily operational security activities contributed to a safe and secure environment. Daily operational security activities included: control of contraband and unauthorized items within institutions; population management; surveillance activities; dynamic security; infrastructure; and equipment.

Institutional Security Operations are primarily conducted by correctional officers and managers:

2.2 Approach

The evaluation of CSC’s Institutional Security used a mixed method research design, incorporating both qualitative and quantitative methodologies. The following lines of evidence were used to address the evaluation questions.

Qualitative Data

Literature and documentation review

A review of publications in the area of institutional security was conducted, including:

Semi-structured Interviews

Interviews were conducted in-person and by telephone with various respondent groups. The evaluation team developed six complementary interview guides specific to each respondent group. The guides included both open and closed-ended questions. Data from the interview guides were analyzed using various software programs (i.e. SNAP Survey, SPSS, Excel or Word), depending on the interview question and respondent group. Qualitative data obtained through open-ended questions were analyzed using the iterative and inductiveFootnote 8 process by members of the evaluation team to identify relevant themes. The final list of themes was constructed by consensus among team members. Qualitative data obtained through closed-ended questions were analyzed using descriptive analysis techniques. Frequencies and percentages were calculated based on the number of valid responses to the questions.

Respondent Groups

Correctional managers: In-person interviews were conducted during the months of February and March 2013 with 95 CMs at 18 institutions (see Appendix D) across all five regions and all security levels.

Institutional staff and management members (excluding correctional managers): In-person interviews were conducted during the months of February and March 2013 with 74 wardens, assistant wardens, and COs at the seven case study sites (see Appendix D).Footnote 9

Security Intelligence Officers: Telephone interviews were conducted with 48 SIOs in April and May 2013. The sample was selected through stratified randomization accounting for all five regions.

NHQ Key Informants: In-person interviews were conducted with 41 key informants within CSC in August and September 2012. Respondents were selected based on their position, duties, and level to target more senior employees directly involved in institutional security activities.

CSC Partners: Telephone interviews were conducted in October and November 2012 with 35 representatives from various external partner organizations. Partner organizations were identified by the Citizen Engagement Directorate, and included those from intelligence and policing fields, volunteers, community groups, and visitors.

Offenders: In-person interviews were conducted by institutional parole officers (PO) with 286 offenders in August and September 2012. The sample was selected from the Offender Management System (OMS) through stratified random sampling across all five regions and security levels while overweighting for women’s institutions and Healing Lodges. As travel for the evaluation team was not possible at the time, the PO for each offender was contacted and asked to administer the interview to each of their offender clients in the sample, and then electronically submit the interview to the evaluation team. The POs who participated were given a set of standardized instructions to support the consistency of the administration of the interviews. The reasons for non-response were recorded by POs as a way to check for selection bias.

Electronic questionnaires

Staff and Management: Invitations to participate in the electronic questionnaire were sent to an initial sample of 1,394 randomly selected institutional staff and management members. A total of 254 employees responded to the questionnaire in November and December 2013 (response rate = 18%). A profile of respondents is provided in Appendix E. The questionnaire was developed using automated software (i.e. SNAP Survey), and was administered through CSC’s Intranet site (InfoNet). The questionnaire solicited respondents’ experiences with overall institutional security activities and included both open and closed-ended questions. Data were analyzed using the same process and procedures as for the interviews.

Questionnaires

Employee Protection Protocol (EPP): A questionnaire was sent by the Departmental Security Division (DSD) in February 2014 to 178 institutional employees who had accessed the services offered by the EPP. Respondents were asked to send completed questionnaires back to the DSD to maintain employee privacy. A total of 20 questionnaires were faxed back to the DSD, which represents an 11% response rate. Data were analysed using the same process and procedures as was used for the interviews.

Formal/informal security training: A brief questionnaire was sent to the wardens and directors of all CSC institutions regarding coaching and mentoring programs at their locations, including on-the-job training, in January 2014.Footnote 10

Case studies

The evaluation team visited seven study sites as part of the case study for the institutional security evaluation. The main objective of the case studies was to seek responses to the evaluation question, "To what extent are dynamic and static security integrated in institutional surveillance activities?". Case studies were conducted at seven sites which included three groupsFootnote 11 of "sister institutions"Footnote 12 selected based on their similar infrastructural design. Case study data included semi-structured interviews with institutional staff and management as describe above as well as naturalistic observations of front-line operations. Observations were conducted using a structured observation template to support interview data. The site visits occurred in February and March 2013.

The evaluation team members did not participate in the event or activity being observed. The observers documented the flow of the activity in the Institutional Security Case Study Observation Guide, which included information such as the area observed, the activities observed, and the people present. The notes from the Observation Guide were rolled up into an Observation Summary which linked the observations to the evaluation indicators and allowed observers to quantify activities observed. Based on the summary, the observers completed the Observation Checklist, where a scale was used to assess the indicators observed. Finally, the observers at each case study site combined their observations into the Summary of Findings, which presented key findings from each institution. Data from the Summary of Findings were collected and analyzed. The analyzed data was then used to provide support for the evaluation’s findings and recommendations.

Quantitative Data

Analyses of automated data

Various sources of automated data were used in the evaluation. They are listed below.

Offender data: Data pertaining to institutional incidents, seizures, urinalysis and offender grievances were extracted from OMS and from Performance Direct and then analysed in SAS and Excel.

Human resource data: Data extracted from the Human Resource Management System (HRMS) database were provided by CSC’s Human Resources Management Section. Data on CX hires, exits, disciplinary action, level of experience as well as data specific to the recruiting process were retrieved as of December 2014 and analysed in SAS and Excel.

Financial data: Financial data for Institutional Security expenditures retrieved from the Integrated Financial and Material Management System (IFMMS) for 2008/2009 to 2013/2014 were analyzed by the evaluation team using Excel.

Data on Complaints and Work Refusals: Data on complaints and work refusals under the Canada Labour Code (CLC) was provided by Employment and Social Development Canada (ESDC; March 19, 2013). Internal CSC data on complaints and work refusals was provided by CSC’s Labour Relations Branch on July 4, 2014 for the period of January 1, 2012 to July 3, 2014. Data were analysed using Excel.

2.3 Limitations

The institutional security evaluation presented a number of limitations. During the time of the evaluation, CSC contributed to Canada’s Economic Action Plan through a series of measures aimed at reducing financial expenditures. These changes may have impacted the way institutional security activities were perceived and thus may have impacted on the results of this evaluation.

The evaluation relied in part on the perspectives and reports of individuals internal and external to CSC. As with any interview or survey data collection method, there is an inherent risk for potential selection and response bias. This is especially true in the case of questionnaires that were conducted with offenders where the methodology required parole officers to administer the questionnaire which may have introduced bias, given the position of authority held by parole officers.

Given the number of institutional security activities that impact security outcomes, in some instances it was not possible to statistically assess the connection between the activities and the outcomes in the logic model because there were variables unaccounted for. However, the evaluation team identified and noted the strongest trends using the combined quantitative and qualitative data available.

4.0 Conclusion

In conclusion, institutional security is essential to ensuring the safety and security of CSC’s institutions. The evaluation found that improvements could be made in areas such as correctional officer recruitment, the EPP, as well as monitoring, reporting and sharing of intelligence information. A positive impact was found regarding dynamic security where activities are contributing to the safety and security of correctional institutions. Currently, CSC staff and management are working together to make inroads into closing gaps identified by the evaluation.

References

Addictions Research Centre. The process of dynamic security and its role in drug interdiction and safer institutional environments: An exploratory study, unpublished, n.d.

Barrows, Julie and C. Ronald Huff (2009). Gangs and Public Policy: Constructing and Deconstructing Gang Databases. Criminology and Public Policy, 8, 4, pp. 675-703.

Bowles, S., Cunningham, C.J.L, De La Rosa, G.M. & Picano, J. (2007). Coaching leaders in middle and executive management: goals, performance, buy-in. Leadership & Organization Development Journal, 28(5), 388-408.

Canada Labour Code, R.S.C., 1985, c.L-2.

Canadian Institute for Health Information (2008). Improving the Health of Canadians: Mental Health, Delinquency and Criminal Activity. Ottawa, ON: Author.

Castle, T.L. (2008). Satisfied in the jail?: Exploring the predictors of job satisfaction among jail officers. Criminal Justice Review, 33, 48-63.

The Correctional Investigator Canada (2009). Annual report of the Office of the Correctional Investigator 2008-2009. Ottawa, ON: Author

Correctional Service Canada. (2001). Report of the Task Force on Security. Retrieved from http://www.csc-scc.gc.ca/text/pblct/security/toc-eng.shtml.

Correctional Service Canada (2003). Commissioner’s Directive 285 – CSC standardized selection process. Ottawa, ON: Author.

Correctional Service Canada (2007a). Correctional Training Program: Pre-session material for Session 03 (Static and Dynamic Security). Internal document.

Correctional Service Canada (2007b). Employee Protection Program: Guidelines. Internal Document.

Correctional Service Canada. (2008a). An Evaluation of the Correctional Training Program (CTP 2008). Ottawa, ON: Author.

Correctional Service Canada (2008b). Guidelines 253-2 - Critical Incident Stress Management. Retrieved from http://www.csc-scc.gc.ca.

Correctional Service Canada. (2008c). National Training Standards. Ottawa, ON: Author.

Correctional Service Canada (2009a). The Changing Federal Offender Population. Retrieved from http://www.csc-scc.gc.ca/research/sr-2009-eng.shtml.

Correctional Service Canada (2009b). Commissioner’s Directive 004 – National Standards for the Deployment of Correctional Officers. Internal Document.

Correctional Service Canada (2009c). Guidelines 004-1 – Operational Adjustments. Internal Document.

Correctional Service Canada (2010a) CX Recruitment Process and CTP Review Renewal Options and Roadmap: Presentation to NHRMC, March 3, 2010. Internal Document.

Correctional Service Canada (2010b). Transformation Agenda Report on Safety and Security Initiatives. Internal document.

Correctional Service Canada (2011a). Applied Dynamic Security. Internal Document.

Correctional Service Canada. (2011b). Audit of the Implementation of the Deployment Standards. Ottawa, ON: Author.

Correctional Service Canada (2011c). PSI Operational Intelligence Manual. Internal document.

Correctional Service Canada (2011d). Statement of Merit Criteria & Conditions of Employment: Correctional Officer. Internal Document.

Correctional Service Canada (2012a). 2011-12 Departmental Performance Report. Ottawa, ON: Author.

Correctional Service Canada (2012b). 2012-13 Report on Plans and Priorities. Ottawa, ON: Author.

Correctional Service Canada (2012c). About us. Retrieved from http://www.csc-scc.gc.ca/about-us/index-eng.shtml/.

Correctional Service Canada. (2012d). Change in Command Audit, Kent Institution Pacific Region. Internal Document.

Correctional Service Canada (2012e). Commissioner’s Directive 566-6 – Security Escorts. Ottawa, ON: Author.

Correctional Service Canada (2012f). Commissioner’s Directive 566-10 – Urinalysis Testing. Ottawa, ON: Author.

Correctional Service Canada (2012g). Performance measurement framework. Internal document.

Correctional Service Canada (2013a). 2012-13 Departmental Performance Report. Ottawa, ON: Author.

Correctional Service Canada (2013b). 2013-14 Report on Plans and Priorities. Ottawa, ON: Author.

Correctional Service Canada (2013c). Chart of Accounts: Financial Coding Manual. Internal Document.

Correctional Service Canada (2013d). Commissioner’s Directive 560: Dynamic Security and Supervision. Ottawa, ON: Author.

Correctional Service of Canada (2013e). Commissioner’s Directive 568: Management of Security Information and Intelligence. Ottawa, ON: Author.

Correctional Service Canada (2013f) Commissioner’s Directive 568-1 - Recording and Reporting of Security Incidences. Ottawa, ON: Author

Correctional Service Canada. (2013g). Commissioner’s Directive 568-2 Recording and sharing of security information and intelligence. Ottawa, ON: Author.

Correctional Service Canada (2013h). Commissioner’s Directive 568-3 – Identification and Management of Security Threat Groups. Ottawa, ON: Author.

Correctional Service Canada (2013i). Commissioner’s Directive 568-9 – Management of human sources. Ottawa, ON: Author.

Correctional Service Canada (2013j). Correctional Service Canada’s Workforce Statistical Profile and Analysis: Correctional Services (CX) Occupational Group: March 31, 2013. Internal Document.

Correctional Service Canada (2013k). Recruitment Process. Retrieved from http://www.csc-scc.gc.ca/careers/003001-3000-eng.shtml.

Correctional Service Canada (2013l). Review of CX Enhanced External Recruitment Pilot "SKYE": CMT – August 16, 2013. Internal Document.

Correctional Service Canada (2014a). Briefing note to the Minister of Public Safety and Emergency Preparedness: Cost of Maintaining an Offender (COMO) – 27-03-2014. Internal Document.

Correctional Service Canada (2014b). Correctional Service of Canada 2013-14 Departmental Performance Report. Ottawa, ON: Author.

Correctional Service Canada (2014c). Correctional Service Canada’s workforce statistical profile and analysis: Correctional Services (CX) occupational group. March 31st, 2014. Internal document.

Correctional Service Canada. (2014d). National Training Standards. Ottawa, ON: Author.

Correctional Service of Canada (2014e). Operational Intelligence Report Collection Plan Template. Internal report retrieved from CSC’s Security Branch in February 2014.

Correctional Service of Canada (2015). National Population Management. Internal Document.

Correctional Service Canada Review Panel (2007). Report of the Correctional Service of Canada Review Panel: A Roadmap to Strengthening Public Safety. Ottawa, ON: Public Works and Government Services Canada.

Corrections and Conditional Release Act, S.C. 1992, c.20.

Corrections and Conditional Release Regulations, SOR/92-620, (1992).

Davis, B. & Higdon, K. (2008). The Effects of Mentoring/Induction Support on Beginning Teachers’ Practices in Early Elementary Classrooms (K-3). Journal of Research in Childhood Education, 22(3), 261-274.

Doherty, S., & White, M. (2013). Dynamic security practice among correctional officers: Acquiring the skills (Research Snippet). Ottawa, ON: Correctional Service Canada.

Fleisher, M.S. & Decker, S.H. (2001). An Overview of the challenges of prison gangs. Corrections Management Quarterly, 5(1), 1-9.

Garland B., Lambert, E.G., Hogan, N.L., Kim, B., Kelley, T. (2014). The Relationship of affective and continuance organizational commitment with correctional staff occupational burnout: A partial replication and expansion study. Criminal Justice Behavior, 41, 1161-1177.

Godwin, C. A. (1999). Applying correctional intelligence to law enforcement investigations. Corrections Today, 61 (5), 94-100.

Government of Canada. (2013). Seizing Canada’s moment: Prosperity and opportunity in an uncertain world. Speech from the Throne, October 16, 2013. Retrieved from http://speech.gc.ca/.

Jordan, M. (2009). Florida STG intelligence unit aims to keep communities safe. Corrections Today, 71 (1), 28-31.

Keinan, G. & Malach-Pines, A. (2007). Stress and burnout among prison personnel: Sources, outcomes, and intervention strategies. Criminal Justice and Behavior, 34, 380-398.

Lambert, E.G. & Paoline, E.A. (2008). The Influence of individual, job, and organizational characteristics on correctional staff job stress, job satisfaction, and organizational commitment. Criminal Justice Review, 33, 541-564.

Lambert, E.G & Hogan, N.L. (2009). Wanting change: The Relationship of perceptions of organizational innovation with correctional staff job stress, job satisfaction, and organizational commitment. Criminal Justice Policy Review, 21, 160-184.

Maslach, C. & Goldberg, J. (1998). Prevention of burnout: New perspectives. Applied and Preventative Psychology, 7(1), 63-74.

Ostroff C. (1992) The relationship between satisfaction, attitudes, and performance: An organizational level analysis. Journal of Applied Psychology, Vol 77, pp. 963-974.

Patton, M. Q. (1980). Qualitative evaluation methods. Beverly Hills, CA: Sage.

Posavac, E. & Carey, R. (1992). Program Evaluation: Methods and Case Studies. University of Michigan, Prentice Hall.

Power, J. & Usher, A. (2014). Working with offenders who self-injure: Fostering staff resilience in high stress situations. Ottawa, ON: Correctional Service Canada.

Public Safety Canada (2013). Correctional and Conditional Release Statistical Overview 2013. Ottawa, ON: Author.

Publiservice (2011). The Fundamentals of mentoring. Internal document.

Pyrooz, David C., Scott H. Decker, and Mark S. Fleisher (2011). From the street to the prison, From the prison to the street: Understanding and responding to prison gangs. Journal of Aggression, Conflict, and Peace Research, 3:12-24

Ruddell, Rick, Scott H. Decker and Arlen Egley, Jr (2006). Gang Interventions in Jails: A National Analysis. Criminal Justice Review, pp. 31: 33.

Safe Streets and Communities Act, S.C. 2012, c.1.

Srivastava, P., & Hopwood, N. (2009). A Practical Iterative Framework for Qualitative Data Analysis. International Journal of Qualitative Methods, 8(1), 76 – 84.

Stewart, L., Wilton, G., & Cousineau, C. (2012) Federally Sentenced Offenders with Mental Disorders: Correctional Outcomes and Correctional Response. Research Report R-268. Ottawa, ON: Correctional Service of Canada.

Treasury Board of Canada Secretariat (2008a). Directive on the Administration of Required Training. Retrieved from http://www.tbs-sct.gc.ca.

Treasury Board of Canada Secretariat (2008b). How do I advance my career? Retrieved from http://www.tbs-sct.gc.ca/quest/car-eng.asp.

Treasury Board of Canada Secretariat (2009). Policy on Evaluation. Ottawa, ON: Author. Retrieved from: http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=15024§ion=text.

Treasury Board of Canada Secretariat (2011) Policy on Learning, Training, and Development. Retrieved from http://www.tbs-sct.gc.ca.

Treasury Board of Canada Secretariat (2012). Policy on Government Security. Retrieved from http://www.tbs-sct.gc.ca.

Treasury Board of Canada Secretariat (2015). 2014 Public Service Employee Survey. Retrieved from http://www.tbs-sct.gc.ca/pses-saff/2014/results-resultats/bd-pm/04/dem221-eng.aspx

Truth in Sentencing Act, S.C. 2009, c.29.

US Department of Justice. (2004). Review of the United States Marshals Service Judicial Security Process. Retrieved from http://www.justice.gov/oig/reports/usms.htm.

Woodbury, Glen. (2005). Measuring Prevention. Homeland Security Affairs. 1(1).

Appendix D: Case Study and Correctional Manager Interview Site Visits

Institution Security Level Travel Period
Case Study Interviews
Triangular Design Model
Atlantic Institution Maximum March 11 – March 15, 2013
Donnacona Institution Maximum March 19 – March 22, 2013
Courtyard Design Model
Edmonton Institution Maximum March 10 – March 16, 2013
Kent Institution Maximum February 24 – March 6, 2013
Structured Campus Model
Drumheller Institution Multi-Level March 25 – March 28, 2013
Springhill Institution Medium March 20 – March 28, 2013
Warkworth Institution Medium February 24 – February 28, 2013
Correctional Manager Interviews
Atlantic Region
Springhill Institution Medium March 20 – March 28, 2013
Nova Institution for Women Multi-Level March 20 – March 28, 2013
Atlantic Institution Maximum March 11 – March 15, 2013
Quebec Region
Sainte-Anne-des-Plaines Institution Minimum March 11 – March 15, 2013
Archambault Institution Medium March 11 – March 15, 2013
Regional Reception Centre Multi-Level March 11 – March 15, 2013
Donnacona Institution Maximum March 19 – March 22, 2013
Ontario Region
Warkworth Institution Medium February 24 – February 28, 2013
Bath Institution Medium March 3 – March 6, 2013
Millhaven Institution Maximum March 3 – March 6, 2013
Prairie Region
Edmonton Institution Maximum March 10 – March 16, 2013
Pê Sâkâstêw Healing Lodge Minimum March 10 – March 16, 2013
Stony Mountain Institution Medium March 25 – March 28, 2013
Rockwood Institution Minimum March 25 – March 28, 2013
Drumheller Institution Multi-Level March 25 – March 28, 2013
Pacific Region
Kent Institution Maximum February 24 – March 6, 2013
Mountain Institution Medium February 24 – March 6, 2013
Fraser Valley Institution for Women Multi-Level February 24 – March 6, 2013

Appendix E: Profile of Staff & Management Questionnaire Respondents

All Respondents Management respondents CX respondents
n % n % n %
Regions 254 139 40
Atlantic 27 11% 11 8% 4 10%
Quebec 48 19% 28 20% 7 18%
Ontario 61 24% 37 27% 11 28%
Prairies 71 28% 38 27% 11 28%
Pacific 47 19% 25 18% 7 18%
Security Level 251 136 40
Maximum 37 15% 12 9% 11 28%
Medium 102 41% 59 43% 12 30%
Minimum 36 14% 20 15% 7 18%
Multi-level 76 30% 45 33% 10 25%

Appendix F: List of Sister Institutions and Design Model

Region Institution Sister Institution Design Model
ONT Joyceville Institution Joyceville, Leclerc Linear
QUE Leclerc Institution Joyceville, Leclerc Linear
PRA Edmonton Institution Edmonton, Kent Courtyard
PAC Kent Institution Edmonton, Kent Courtyard
PRA Drumheller Institution Cowansville, Drumheller, Springhill, Warkworth Structured Campus
QUE Cowansville Institution Cowansville, Drumheller, Springhill, Warkworth Structured Campus
ATL Springhill Institution Cowansville, Drumheller, Springhill, Warkworth Structured Campus
ONT Warkworth Institution Cowansville, Drumheller, Springhill, Warkworth Structured Campus
QUE Port Cartier Institution Atlantic, Donnacona, Port Cartier Triangular
ATL Atlantic Institution Atlantic, Donnacona, Port Cartier Triangular
QUE Donnacona Institution Atlantic, Donnacona, Port Cartier Triangular
ONT Millhaven Institution Archambault, Millhaven Radial
QUE Archambault Institution Archambault, Millhaven Radial

Appendix G: Results of Multiple Regression Analyses

Results of Multiple Regression Analysis - Experience and Security Incidents (log), 2008/2009 to 2012/2013
Parameter Estimate Standard Error t-Value P value 95% Confidence Level
2008/2009 -0.04238 0.00887 -4.78 <.0001 -0.06018 -0.02458
2009/2010 -0.04594 0.00994 -4.62 <.0001 -0.06589 -0.02599
2010/2011 -0.05033 0.01019 -4.94 <.0001 -0.07078 -0.02988
2011/2012 -0.05417 0.01006 -5.38 <.0001 -0.07436 -0.03398
2012/2013 -0.05637 0.01208 -4.67 <.0001 -0.08061 -0.03213
Results of Multiple Regression Analysis - Experience and Security-related Offender Grievances (log), 2008/2009 to 2012/2013
Parameter Estimate Standard Error t-Value P value 95% Confidence Level
2008/2009 -0.02814 0.00769 -3.66 0.0006 -0.04357 -0.01270
2009/2010 -0.03825 0.00658 -5.82 <.0001 -0.05146 -0.02504
2010/2011 -0.03033 0.00984 -3.08 0.0033 -0.05008 -0.01058
2011/2012 -0.04615 0.00778 -5.93 <.0001 -0.06176 -0.03055
2012/2013 -0.04901 0.00937 -5.23 <.0001 -0.06780 -0.03022

Footnotes

Footnote 1

Throughout the evaluation, the acronyms CX and CO will be used to refer to specific groupings of CSC correctional staff. CX refers to the classification group of correctional officers (CO; CX-01 and CX-02), primary workers (PW; CX-02) and correctional managers (CM; CX-04). Some aspects of the evaluation focus on specific groups of CX staff, in which case the appropriate acronyms will be used (i.e. CO, PW, CM).

Return to footnote 1

Footnote 2

CSC is the federal government agency responsible for administering sentences imposed by the courts that are two years or more. Sentence administration includes the management of correctional institutions of various security levels and the supervision of offenders under conditional release in the community. More information regarding CSC, including policy and legislation, can be found at http://www.csc-scc.gc.ca.

Return to footnote 2

Footnote 3

Both sections are included under the Purpose and Principles section of the CCRA.

Return to footnote 3

Footnote 4

CSC’s Program Alignment Architecture (PAA) is an inventory of programs grouped by related sub-programs and linked to its strategic outcome: "The custody, correctional interventions, and supervision of offenders in institutions and in communities, contribute to public safety."

Return to footnote 4

Footnote 5

Although the scope of the evaluation includes only specific institutional security activities, the full spectrum of activities is detailed in the program Logic Model (see Appendix B and Appendix C)

Return to footnote 5

Footnote 6

Throughout the evaluation, the acronyms CX and CO will be used to refer to specific groupings of CSC correctional staff. CX refers to the classification group of correctional officers (CO; CX-01 and CX-02), primary workers (PW; CX-02) and correctional managers (CM; CX-04). Some aspects of the evaluation focus on specific groups of CX staff, in which case the appropriate acronyms will be used (i.e. CO, PW, CM).

Return to footnote 6

Footnote 7

Primary Workers in the Healing Lodge for women offenders are also known as Kimisinaw.

Return to footnote 7

Footnote 8

An iterative and inductive qualitative analysis process identifies emerging themes and meaning from data through a repetitive reflexive process. (see Srivastava & Hopwood, 2009 and Patton, 1980.)

Return to footnote 8

Footnote 9

Details about the case studies are found later in this section.

Return to footnote 9

Footnote 10

If the questionnaire was not returned within 4 weeks, evaluation team members called the warden’s office as a reminder. There was a 100% response rate.

Return to footnote 10

Footnote 11

The following institutions were visited based on their design model: Edmonton and Kent institutions are based on the Courtyard model; Drumheller, Springhill and Warkworth institutions are based on the Structured Campus model; and Atlantic and Donnacona are based on the Triangular design model.

Return to footnote 11

Footnote 12

"Sister institution" is a term that refers to institutions that were built with a similar infrastructural design model. Institutional design models refer primarily to the original style of offender accommodations, and the manner in which offenders circulate through the institution. Institutions can be of the same design model without being sister institutions. There are five types of design model: linear, courtyard, structured campus, triangular and radial. CSC currently has 13 sister institutions. A list and description of sister institutions is provided in Appendix F.

Return to footnote 12

Footnote 13

Commissioner’s Message dated February 26, 2010. Posted on InfoNet.

Return to footnote 13

Footnote 14

From Overview of Safe Streets and Communities Act, posted on InfoNet, May 2, 2012.

Return to footnote 14

Footnote 15

In 2001, CSC’s Task Force on Security developed a security framework to optimize staff and offender interactions while promoting safe reintegration. The framework was divided into four components: safety, respect, leadership and learning and contained eighty recommendations to further CSC’s growth as "a professional, humane and restorative correctional system" (CSC 2001, p. 1).

Return to footnote 15

Footnote 16

Kingston Penitentiary and Leclerc Institution were closed on September 30, 2013. They are included in this evaluation as they were open during the period of time examined. As of April 1, 2014, a number of institutions were clustered, where some institutions that were geographically close were merged to share the same site name and warden, although they would retain their security classification.

Return to footnote 16

Footnote 17

Source: CRS, Offender Profile Data Cube, retrieved on October 25, 2013. Violent offences include Murder I, Murder II and Schedule I offences.

Return to footnote 17

Footnote 18

Security incidents were defined in accordance with the definition provided in CSC’s Performance Direct tool and included, for example: disciplinary problems, disruptive behaviors, threats, possession of contraband damage to property, inmate fights, assaults on staff/offenders/visitors, hostage taking, homicides, murders (or attempted), escape (or attempted).

Return to footnote 18

Footnote 19

Other classification groups were examined where deemed relevant.

Return to footnote 19

Footnote 20

Occupational groups noted: CR – Clerical and Regulatory; GS – General Services; AS – Administrative Services; WP – Welfare Programmes; FI – Financial Management; PS – Psychology.

Return to footnote 20

Footnote 21

PWs were not examined because they go through separate competitive processes than CX-01s.

Return to footnote 21

Footnote 22

Data source: HRMS May 2014.

Return to footnote 22

Footnote 23

A total of 141 disciplinary actions were found in HRMS for CX-01 staff members having been hired over the last five years.

Return to footnote 23

Footnote 24

Note that follow up times recruits from the new process varied, ranging from 3 months to 10 months.

Return to footnote 24

Footnote 25

Source: HRMS, data retrieved May 2014

Return to footnote 25

Footnote 26

The exact number of respondents associated to this percentage was not available.

Return to footnote 26

Footnote 27

Dynamic security includes the activities performed by staff to increase their awareness of offender behaviour and activities that may indicate potential problems or incidents. A key component of dynamic security is the interaction between staff and offenders.

Return to footnote 27

Footnote 28

Security incidents were defined in accordance with the definition provided in CSC’s Performance Direct tool and included, for example: disciplinary problems, disruptive behaviors, threats, possession of contraband damage to property, inmate fights, assaults on staff/offenders/visitors, hostage taking, homicides, murders (or attempted), escape (or attempted).

Return to footnote 28

Footnote 29

Security related offender grievances included cases of, for example: discrimination, harassment by staff, placement and living conditions in segregation, use of force, searches.

Return to footnote 29

Footnote 30

Years of service includes all federal government service in any department or position.

Return to footnote 30

Footnote 31

Multiple regression analyses were performed using institutional averages of years of experience working for CSC and institutional OPY rates of security related incidents (log) and offender grievances (log). Analyses were performed on a yearly basis for a period of 5 years (i.e. yearly analyses were repeated for five years from 2008/2009 to 2012/2013).

Return to footnote 31

Footnote 32

The years of experience were calculated by subtracting the date of hire into CSC for each employee from the last day of the relevant fiscal year (March 31), and then average years of experience were calculated for members of the CX group. The decision was made to use the date of hire, rather than date of position, as the majority of new recruits to the CX group come from outside CSC (95%; n = 298 in 2012/2013; CSC, 2014c)

Return to footnote 32

Footnote 33

Institutional adjustment and security risk ratings are obtained through an actuarial tool, the Custody Rating Scale (CRS). These scores are an indication of the level of risk that an offender poses within the institution and to the community in the case of an escape.

Return to footnote 33

Footnote 34

Risk, need, motivation and reintegration potential are overall offender ratings assessed through a number of actuarial tools (i.e. the Custody Rating Scale; the Revised Statistical Information on Recidivism; the Static Factor Rating, the Dynamic Factor Identification and Analysis, Revised) along with professional judgement.

Return to footnote 34

Footnote 35

Totals composed of data from the following data collection tools: staff and management (SM) questionnaire (46%; n = 115); case study (CS) interviews (19%; n = 12); correctional manager (CM) interviews (24%; n = 21).

Return to footnote 35

Footnote 36

Static security consists primarily of physical equipment and infrastructure (e.g. fences, CCTV, x-ray machines), but also includes the procedures involved in ensuring the security of the institution, staff, and offenders (e.g. responding to alarms, staffing posts, inmate movement).

Return to footnote 36

Footnote 37

Source: HRMS, April 1st, 2013. Experience data was only available for indeterminate employees within the institutions. In 2012/2013, the institutional average of CX staff experience ranged from 5.07 to 23.06 years. The average years of CX staff experience for each institutional security level group was calculated by first determining the average years of CX staff experience for each institution. The institutional averages were then averaged by security level group. As such, these do not represent an average of individual experience but an average of institutional experience.

Return to footnote 37

Footnote 38

Data only includes indeterminate employees. Source: HRMS, April 1st, 2013.

Return to footnote 38

Footnote 39

Mentoring is a long term relationship that is built on trust and focuses on broad issues the mentee wishes to discuss (e.g. both personal and professional), and is defined as "a relationship between an experienced person (mentor) who shares his or her professional skills, knowledge and insights with another individual (mentee) willing and ready to learn, grow and develop skills and confidence in his or her professional development" (Publiservice, 2011). Coaching is a shorter term relationship that focuses on the transfer of professional skills from a more experienced individual (the coach). Coaching is described by the TBS as "a two-way conversation that helps overcome problems, generates creative ideas and solutions, develops knowledge or skills and improves performance" (TBS, 2008b).

Return to footnote 39

Footnote 40

Note this evaluation was based on CTP as it was delivered prior to being centralized in Regina.

Return to footnote 40

Footnote 41

While respondents spoke of coaching and mentoring interchangeably, the context within which views were expressed by interviewees was more consistent with the definition of coaching rather than mentoring.

Return to footnote 41

Footnote 42

Percentages were calculated based on the total number of respondents to each question, and not the total number of respondents to the questionnaire.

Return to footnote 42

Footnote 43

Totals composed of data from the following data collection tools: CS interviews (24%; n = 16); CM interviews (43%; n = 40).

Return to footnote 43

Footnote 44

Totals composed of data from the following data collection tools: SM questionnaire (25%; n = 47); CS interviews (24%; n = 16); CM interviews (43%; n = 40).

Return to footnote 44

Footnote 45

The majority of new CXs are now deployed to maximum or medium security level institutions for their first two years of employment.

Return to footnote 45

Footnote 46

Action implemented through a MAP from Recommendation 1 of this evaluation.

Return to footnote 46

Footnote 47

Annex D – Site Deployment Levels (in CSC, 2009)

Return to footnote 47

Footnote 48

Totals composed of data from the following data collection tools: SM questionnaire (68%; n = 171); CS interviews (24%; n = 16); CM interviews (41%; n = 38).

Return to footnote 48

Footnote 49

Totals composed of data from the following data collection tools: SM questionnaire (53%; n = 127); CS interviews (23%; n = 17); CM interviews (18%; n = 17).

Return to footnote 49

Footnote 50

Totals composed of data from the following data collection tools: SM questionnaire (43%; n = 69); CS interviews (26%; n = 23); CM interviews (31%; n = 21).

Return to footnote 50

Footnote 51

Totals composed of data from the following data collection tools: CS interviews (19%; n = 14); CM interviews (18%; n = 16).

Return to footnote 51

Footnote 52

Out of the 639, there were: 404 127.1s; 232 128s; 2 listed as 127.1 to 128; and 1 blank.

Return to footnote 52

Footnote 53

Out of the total n = 67 complaints or refusals to work related to deployment.

Return to footnote 53

Footnote 54

Out of the 39: 27 were 127.1s, 11 were 128s, and 1 was a 127.1 to 128.

Return to footnote 54

Footnote 55

When an employee makes a refusal to work complaint an internal process to resolve the issue and return the employee to work is launched. If no resolution is made through this process and the employee continues to refuse to work then the complaint is referred to ESDC to be investigated and a ruling of danger/no danger is made.

Return to footnote 55

Footnote 56

Of the 11 cases listed as ongoing, as of July 4, 2014, 2 were being investigated by ESDC.

Return to footnote 56

Footnote 57

The audit team were unable to confirm whether the unmanned positions were operationally adjustable positions or not.

Return to footnote 57

Footnote 58

The assessment focuses on four constants: intent, potential consequences, risk, and impact on the target.

Return to footnote 58

Footnote 59

Threat Risk Assessment: an evaluation of factors that could pose a danger to the management of an offender, the safety of others, or security of an operational unit in particular circumstances. (CSC, 2012e, Annex E)

Return to footnote 59

Footnote 60

Only the EAP was mentioned on the EPP TRA report instructions, but a new pre-assessment tool will specifically ask and document whether the EAP and CISM were offered. Source: email of September 30, 2014 from Denise Silva, Departmental Security Branch.

Return to footnote 60

Footnote 61

Totals composed of data from the following data collection tools: SM questionnaire (92%; n = 231); CS interviews (40%; n = 27); CM interviews (28%; n = 25)

Return to footnote 61

Footnote 62

Totals composed of data from the following data collection tools: CS interviews (13%; n = 9); CM interviews (19%; n = 17).

Return to footnote 62

Footnote 63

Case study interviews only.

Return to footnote 63

Footnote 64

Correctional manager interviews only.

Return to footnote 64

Footnote 65

A file is considered closed when corrective measures have been taken to mitigate the risks and a TRA update does not recommend any further reviews or when a TRA or TRA update indicates the threat is no longer present. A file may be reopened with new information that may warrant increased security measures.

Return to footnote 65

Footnote 66

The questionnaire was sent to 178 employees who had accessed the EPP. The response rate was 11%.

Return to footnote 66

Footnote 67

Among employees surveyed, all were personally involved in the event that lead to their EPP case and 35% (n = 7) of cases also involved the respondent’s family. Respondents were not asked the timeframe they accessed or made use of the EPP.

Return to footnote 67

Footnote 68

One respondent refused security measures, and one did not indicate what measures were put in place.

Return to footnote 68

Footnote 69

More than one measure may have been put in place for the respondent.

Return to footnote 69

Footnote 70

In the majority of cases, the EPP evaluation process started within a week (63%; n = 12), and in some cases it took more than a month (32%; n = 6). One of the nineteen respondents indicated that they were never notified that the process took place.

Return to footnote 70

Footnote 71

The onus is on the victim to register to receive information about the offender.

Return to footnote 71

Footnote 72

Releases include: temporary absences, work release, parole, and statutory release.

Return to footnote 72

Footnote 73

Some of the skills included in course section on communication skills are active listening, responsive listening, and breaking bad news over the telephone.

Return to footnote 73

Footnote 74

Human sources are defined as "any person who provides information to an agency and expects confidentiality. These persons are protected by informant privilege which is intended to protect their identity." (CSC, 2013i, Annex A.)

Return to footnote 74

Footnote 75

Open sources refer to publicly available information, such as newspapers, academic papers, and on the internet, including social media.

Return to footnote 75

Footnote 76

See Component #3: Institutional Security Operations – Dynamic Security.

Return to footnote 76

Footnote 77

Totals composed of data from the following data collection tools: CS interviews (49%; n = 34); CM interviews (44%; n = 40).

Return to footnote 77

Footnote 78

Totals composed of data from the following data collection tools: CS interviews (100%; n = 73); CM interviews (99%; n = 94).

Return to footnote 78

Footnote 79

Investigations related to incidents that occurred within the institution.

Return to footnote 79

Footnote 80

Investigations related to incidents that occurred in the community but involve offenders.

Return to footnote 80

Footnote 81

Resource allocation is also known as strategic intelligence.

Return to footnote 81

Footnote 82

Totals composed of data from the following data collection tools: SM questionnaire (47%; n = 115); CS interviews (48%; n = 33); CM interviews (48%; n = 44); SIO interviews (48%; n = 23).

Return to footnote 82

Footnote 83

As per CSC’s Commissioner’s Directive 568 - Management of Security Information and Intelligence, all staff are to immediately report any situation that could jeopardize the safety and security of an operational unit, individuals or the protection of society (CSC, 2013e).

Return to footnote 83

Footnote 84

A Statement/Observation Report (SOR) should be completed by all staff, volunteers and contractors to document incidents or behaviours that have been witnessed or observed where those incidents or behaviours are significant or out of the ordinary, considered to be potentially sensitive in nature, or identify offender associates, affiliates, incompatibles and contacts (CSC, 2013f; 2013g).

Return to footnote 84

Footnote 85

Key informants were NHQ staff members from the Security Branch and other relevant sectors (Legal Services, CORCAN, Aboriginal Initiatives, etc.)

Return to footnote 85

Footnote 86

Totals composed of data from the following data collection tools: SM questionnaire (51%; n = 126); CS interviews (45%; n = 31); CM interviews (30%; n = 28).

Return to footnote 86

Footnote 87

Communication between staff and managers was found to be "strained" at the institutional level according to the Change in Command Audit, Kent Institution Pacific Region. To address this, the audit recommended that "senior managers should establish effective strategies to improve communication throughout the institution at all levels." (CSC, 2012d)

Return to footnote 87

Footnote 88

Totals composed of data from the following data collection tools: SM questionnaire (61%; n = 150); CS interviews (6%; n = 4); CM interviews (8%; n = 7).

Return to footnote 88

Footnote 89

SINet is the Security Intelligence Network: a computer program that allows SIOs to enter, share and link related intelligence data.

Return to footnote 89

Footnote 90

Totals composed of data from the following data collection tools: SM questionnaire (53%; n = 130); CS interviews (12%; n = 8); CM interviews (14%; n = 13); SIO interviews (65%; n = 31).

Return to footnote 90

Footnote 91

Totals composed of data from the following data collection tools: SM questionnaire (39%; n = 97); CS interviews (4%; n = 3); CM interviews (3%; n = 3); SIO interviews (50%; n = 24).

Return to footnote 91

Footnote 92

Totals composed of data from the following data collection tools: SM questionnaires (16%; n = 39); CS interviews (1%; n = 1); CM interviews (1%; n = 1).

Return to footnote 92

Footnote 93

Totals composed of data from the following data collection tools: SM questionnaire (30%; n = 37); CS interviews (25%; n = 17); CM interviews (28%; n = 25); SIO interviews (17%; n = 8).

Return to footnote 93

Footnote 94

Totals composed of data from the following data collection tools: SM questionnaire (9%; n = 11); CS interviews (15%; n = 10); CM interviews (10%; n = 9); SIO interviews (46%; n = 22).

Return to footnote 94

Footnote 95

Correctional Services Canada Form 1445.

Return to footnote 95

Footnote 96

Totals composed of data from the following data collection tools: SM questionnaire (68%; n = 84); CS interviews (75%; n = 51); CM interviews (79%; n = 70); SIO interviews (83%; n = 40).

Return to footnote 96

Footnote 97

Totals composed of data from the following data collection tools: SM questionnaire (4%; n = 5); CS interviews (15%; n = 10); CM interviews (13%; n = 12); SIO interviews (40%; n = 19).

Return to footnote 97

Footnote 98

A. Martel (Personal communication) December 9, 2014.

Return to footnote 98

Footnote 99

Totals composed of data from the following data collection tools: SM questionnaire (69%; n = 174); CS interviews (85%; n = 63); SIO interviews (94%; n = 45).

Return to footnote 99

Footnote 100

Totals composed of data from the following data collection tools: SM questionnaire (78%; n = 193); CS interviews (68%; n = 50); SIO interviews (73%; n = 35).

Return to footnote 100

Footnote 101

Totals composed of data from the following data collection tools: SM questionnaire (74%; n = 185); CS interviews (74%; n = 54); SIO interviews (77%; n = 37).

Return to footnote 101

Footnote 102

Totals composed of data from the following data collection tools: SM questionnaire (68%; n = 169); CS interviews (79%; n = 58); SIO interviews (90%; n = 43).

Return to footnote 102

Footnote 103

Totals composed of data from the following data collection tools: SM questionnaire (57%; n = 140); CS interviews (71%; n = 52); CM interviews (76%; n = 72).

Return to footnote 103

Footnote 104

Totals composed of data from the following data collection tools: CS interviews (74%; n = 55); CM interviews (70%; n = 66).

Return to footnote 104

Footnote 105

Active monitoring refers to observing offender behaviours, monitoring the changes and keeping track of the fluctuations.

Return to footnote 105

Footnote 106

Totals composed of data from the following data collection tools: SM questionnaire (28%; n = 55); CS interviews (28%; n = 19); CM interviews (27%; n = 25).

Return to footnote 106

Footnote 107

Totals composed of data from the following data collection tools: SM questionnaire (28%; n = 54); CS interviews (31%; n = 21); CM interviews (28%; n = 26).

Return to footnote 107

Footnote 108

Totals composed of data from the following data collection tools: SM questionnaire (25%; n = 49); CS interviews (15%; n = 10); CM interviews (9%; n = 8).

Return to footnote 108

Footnote 109

The following sub-activities and sub-sub-activities were included in the analysis: 1.0 Custody, including 1.1 Institutional Management and Support and 1.2 Institutional Security (includes 1.2.1 Intelligence and Supervision and 1.2.2 Drug Interdiction); as well as, Cost Centre (CC) 280 (Electronic Engineering Policy & Services) and CC 283 (Electronic Systems Maintenance), both under sub-sub-program 1.4.2 Accommodation Services as they related to the maintenance of electronic systems in the institutions (e.g. security cameras, PIDS, radios). The total expenditures presented do not include retroactive pay. In addition, costs related to parole offices or community correctional centers were not included.

Return to footnote 109

Footnote 110

Source: IFMMS, extracted February 27 & 28, 2014 and February 12, 16 & 17, 2015.

Return to footnote 110

Footnote 111

According to the 2013-14 Departmental Performance Report, the increase in expenditures is largely as a result of the ratification of collective agreements (CSC, 2014b).

Return to footnote 111

Footnote 112

210-Salaries includes, but not limited to, items such as Salaries Indeterminate Employees, Severance Pay, Overtime, Premium Pay, Shift Premium, and Allowances – Employees.

240-Operating costs include, but are not limited to, items such as Other Operating Equipment and Supplies <$10,000, Employee clothing, and Telecommunications Services.

Return to footnote 112

Footnote 113

The rate of security related salary costs increased from $39.9 million per 1,000 offenders in 2008/2009 to $43.8 million per 1,000 offenders in 2013/2014.

Return to footnote 113

Footnote 114

Serious security incidents are defined by CSC’s Performance Direct as "any security-related incident that does not result in actual death but is of a serious nature", and includes, for example: assaults on staff/offenders/visitors, hostage takings, escapes (actual and attempted), and inmate fights.

Return to footnote 114

Footnote 115

In order to better identify and intervene with "offenders at risk for self-injury or suicide, CSC reinforced actions to prevent deaths in custody by stressing the importance of security patrols, including dynamic security practices" (CSC, 2014b, p. 23).

Return to footnote 115

Footnote 116

The National Population Management Approach integrates accommodation, resources and interventions to ensure offenders are appropriately placed within CSC’s institutions. (CSC, 2015)

Return to footnote 116

Footnote 117

Drug-related seizures, as reported by Performance Direct, include incidents where drugs or drug-related paraphernalia were seized.

Return to footnote 117

Footnote 118

Source: email 2014-09-23 from Debb Matthews, Senior Project Manager, Security Operations.

Return to footnote 118

Footnote 119

Negative test results are where the concentration of intoxicants in the urine sample are below the cut-off levels listed in Annex B and C of CD 566-10 (CSC, 2012f).

Return to footnote 119

Page details

Date modified: