Advertisement

Inappropriate Dealing with Client Information

  • Andrew Goldsmith
  • Mark Halsey
  • Andrew Groves
Chapter
  • 332 Downloads
Part of the Crime Prevention and Security Management book series (CPSM)

Abstract

Information records play a highly significant role in correctional settings. One scholar has referred to the “supremacy that information has within the prison system” (McIlwain 2004: 254). This system dependence has grown greater as bureaucracy has intensified and psychological risk-management principles have come to play a greater part in institutional life (Crewe 2011b). The significance of written reports and other information collected by officers lies largely in their constitutive character—how information that enters the official record comes to represent, correctly or incorrectly, the identity/character of the prisoner (or probationer or parolee) for a variety of system decisions, including classification for accommodation purposes, as well as access to programs and to health-related treatment. How this information is shaped, in short, has material, and potentially prejudicial, consequences in the lives of correctional clients, and thus creates conditions for integrity breaches (see Ruppert 2013).

Keywords

Official Record Confidential Information Correctional Setting Unauthorised Access Correctional Staff 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. BBC News. (2014a). Ex-prison officer jailed for selling Jon Venables story. BBC News. Retrieved December 11, 2014, from http://www.bbc.com/news/uk-30436554.Google Scholar
  2. BBC News. (2015). Prison officer admits selling Jon Venables details to the Sun. BBC News. Retrieved January 20, 2015, from http://www.bbc.com/news/uk-30897882.Google Scholar
  3. Bennett, J., Crewe, B., & Wahidin, A. (Eds.) (2008). Understanding prison staff. Cullompton: Willan.Google Scholar
  4. Centre for the Protection of National Infrastructure (CPNI) (2013). CPNI insider data collection study: Report of main findings. London: CPNI.Google Scholar
  5. Crewe, B. (2009). The prisoner society. Oxford: Oxford University Press.Google Scholar
  6. Crewe, B. (2011a). Soft power in prison: Implications for staff-prisoner relationships, liberty and legitimacy. European Journal of Criminology, 8(6), 455–468.CrossRefGoogle Scholar
  7. Crewe, B. (2011b). Depth, weight, tightness: Revisiting the pains of imprisonment. Punishment & Society, 13(5), 509–529.CrossRefGoogle Scholar
  8. Crime and Misconduct Commission (CMC) (2009). Perceptions of misconduct in Queensland correctional institutions: A survey of custodial officers. CMC: Queensland.Google Scholar
  9. Goldsmith, A. (2015). Disgracebook policing: Social media and the rise of police indiscretion. Policing & Society, 25(3), 249–267.CrossRefGoogle Scholar
  10. Gorta, A. (2006). Corruption risks areas and corruption resistance. In C. Sampford, A. Shacklock, C. Connors, & F. Galtung (Eds.), Measuring corruption. Aldershot: Ashgate Publishers.Google Scholar
  11. Heyward, G. (2011). Corruption officer: From jail guard to perpetrator inside Rikers Island. New York: Simon and Schuster.Google Scholar
  12. Independent Broad-based Anti-corruption Commission (IBAC) (2015). Organised crime group cultivation of public sector employees. Melbourne: IBAC.Google Scholar
  13. Independent Commission Against Corruption (ICAC) (2011). Corruption risks in NSW government procurement: Suppliers’ perceptions of corruption. Sydney: ICAC.Google Scholar
  14. Independent Commission Against Corruption (ICAC), NSW (2004). Report on investigation into the introduction of contraband into the Metropolitan Remand and Reception Centre, Silverwater. Sydney: ICAC.Google Scholar
  15. Leveson, B. (2012). Leveson inquiry: Culture, practice and ethics of the press. London: The Stationery Office.Google Scholar
  16. McDermott, K., & King, R. (1988). Mind games: Where the action is in prison. British Journal of Criminology, 28(3), 357–377.Google Scholar
  17. McIlwain, G. (2004). Professional misconduct between inmates and non-custodial staff: A study of Queensland’s correctional centres. Ph.D. thesis, Griffith University, Queensland, Australia.Google Scholar
  18. Office of Police Integrity (2010). Sensitive and confidential information in a police environment. Melbourne: OPI.Google Scholar
  19. People, J. (2008). Unauthorised disclosure of confidential information by NSW police officers. Research and Issues Papers No. 2. Sydney: NSW Police Integrity Commission.Google Scholar
  20. Ruppert, E. (2013). Not just another database: The transactions that enact young offenders. Computational Culture, 1–13. Retrieved from http://research.gold.ac.uk/9630/1/Ruppert%202013a.pdf.Google Scholar
  21. Toch, H. (1992). Living in prison: The ecology of survival. Washington: APA.CrossRefGoogle Scholar
  22. Vaughn, M., & Smith, L. (2006). Practicing penal harm medicine in the United States: Prisoner’s voices from jail. Justice Quarterly, 16(1), 175–231.CrossRefGoogle Scholar
  23. Weber, D. (2015). WA prison officer fined for using corrective services computer to get information about inmates. ABC News. Retrieved August 6, 2015, from http://www.abc.net.au/news/2015-08-06/prison-officer-hansra-fined-used-computer-to-look-up-inmates/66 79130.Google Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s) 2016

Authors and Affiliations

  • Andrew Goldsmith
    • 1
  • Mark Halsey
    • 1
  • Andrew Groves
    • 2
  1. 1.Flinders UniversityAdelaideAustralia
  2. 2.Deakin UniversityBurwoodAustralia

Personalised recommendations