National Institute of Corrections
You are not signed in! To post comments and participate in discussions you need to sign in or create a free account.
Applying New Vulnerability Assessment Tools in Hennepin County
National Jail Exchange

Subscribe (RSS)

Submitted by Captain Mike Wresh, Commander, Hennepin County Detention Division, Minneapolis, Minnesota for the 2007 LJN Exchange.

Summary

A Correctional Vulnerability Assessment is different from security audits in several ways, because a CVA considers three dimensions of the correctional setting: physical plant, technology, and operations.

www.Hennepin.us: Your Connection To Hennepin County, MinnesotaIn 2006, 12 county jails received a week of training that introduced a powerful new risk management tool developed by the National Institute of Justice (NIJ) and the American Correctional Association (ACA). Building on vulnerability assessment techniques developed by Sandia National Laboratories to protect nuclear power plants and weapons, the ACA project developed a similar tool for use in state prisons. ACA’s Correctional Vulnerability Assessment Handbook (CVA) explains the vulnerability assessment process and serves as the centerpiece of additional resources that have been developed with National Institute of Corrections (NIC) funding.

Sections of this article address what "vulnerability assessment" is; how CVA is different from other risk assessments or security audits; what is involved in the CVA methodology; steps in the CVA process; ways Hennepin County has used CVA findings; and jail vulnerability assessment resources.




Posted Mon, Jan 10 2011 1:55 PM by Joshua Stengel
Filed under: ,

Comments

Be the first to comment on this article!
You must sign in or create an account to comment.
Brought to you by:
National Institute of Corrections
U.S. Dept. of Justice | 320 First Street | Washington, DC 20534 | 800.995.6423

This blog is funded by a contract from the National Institute of Corrections, U.S. Department of Justice. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice.