Lost your Password?
Click Here
Don't have an account?
Register Here
Welcome to the EuroPris Knowledge Management System. The table below shows questions and responses from European National Agencies. Select a question for more information or use the filters on the left to narrow down questions based on Agency or Category.
Want to ask a question? Please read our guidance information found here: Submitting a KMS Question
← Back Search KMSThis content is only available to registered members of EuroPris.
Introduction: In the context of the adaption of the guidelines regarding computer systems used by inmates in Austrian prisons, we would be interested in your answers to the following questions:
Before COVID, computer devices were genally restricted and only use for university studies. After COVID, handies have been introduced in order to allow to make phone and video calls with the families.
Does a legal basis for computer systems exist?In this moment, due to the new situation, we are evaluating the possibility of a modification of our penitentiary rule in order to allow the use of new technologies inside prison services.
What kind of computer systems are permitted?The Service use general systems with security limitations.
How are the computer systems procured?Computer systems are procured by the Administration.
How are the computer systems supervised?There is specific technical officers and also security officers. The first of them prepared or supervise the computer or handy that is going to be use. The second of them controls that the use is the correct.
How are manipulations prevented?As stated in the question before.
Are there any other details that need to be mentioned?According to actual limitations and general situation, new technologies are a very useful instrument. Their use should be reconsider and regulated.
Inmates have joint use workstations (laptops) in all units. In Hämeenlinna prison inmates have personal cell device (laptop) with a smart system installed.
Does a legal basis for computer systems exist?Yes, inmates’ right to use Internet and videocalls is in our Imprisonment and Remand Imprisonment Act.
What kind of computer systems are permitted?Only the workstations provided by CSA. In open prisons inmates can use their personal devices with a special permission (for example for studying purposes).
How are the computer systems procured?Service for joint use workstation is provided by Government ICT center. Hämeenlinna smart system service is provided by private company.
How are the computer systems supervised?Workstations are hardened and Internet use is restricted to whitelisted websites selected by CSA’s staff (+ security checked before use). Inmates must apply permission to use workstations from prison director. The use need not to be supervised personally by staff due to these reasons mentioned. However, video calls (Skype) from joint use workstations are supervised by staff. Personal cell devices can be supervised remotely as well as videocalls.
How are manipulations prevented?By hardening the workstations and controlling the whitelist.
Are there any other details that need to be mentioned?-
The current legislation of the conditions of pre-trial detention and prison sentence execution does not explicitly regulate the possession of the PCs of inmates. In compliance with the Act on pre-trial detention or Act on prison sentence execution, the inmate can have on one apart from the exhaustively determined things (photos, own books, magazines, study materials, documents concerning the legal matters, correspondence, correspondence needs, hygienic needs, things bought in the prison shop, a watch, electric shaver, immersion heater, quick-boiling pot) also other things permitted by prison governor. However, the limit for permission of own PCs is the restriction stipulated by the law for all electric appliances that the inmate can have on one – any electric appliance can´t have installed any device enabling the illegal transmission of information. All prison libraries are equipped with PCs for the purpose of making available the electronic documents, mainly the generally binding legal regulations.
Does a legal basis for computer systems exist? What kind of computer systems are permitted? How are the computer systems procured? How are the computer systems supervised? How are manipulations prevented? Are there any other details that need to be mentioned?No. Currently, those in custody are not permitted to possess personal laptops or tablets. However, after the onset of the Covid-19 pandemic, prisoners were issued with individual mobile phones, but these are not connected to any internet services. People in custody can access laptops for educational purposes within the Learning Centre of each establishment. These can access an approved suite of educational sites relevant to the completion of designated course work. The provision of regulated and approved in-cell ICT is currently under active consideration within the Scottish Prison Service.
Does a legal basis for computer systems exist? What kind of computer systems are permitted? How are the computer systems procured? How are the computer systems supervised? How are manipulations prevented? Are there any other details that need to be mentioned?It is possible, but not all inmates are allowed. It depends on an inmate’s legal status based on the nature of the crime committed and other contributing factors, such as an inmate’s behaviour during sentence term, compliance with the obligations and restrictions, attitude towards employment and learning, reaction to psychological interventions and social rehabilitation measures.
Does a legal basis for computer systems exist?The use of computer systems is regulated by the law (Penitentiary Code of the Republic of Lithuania) and set out in detail in the implementing legislation.
What kind of computer systems are permitted?Inmates in an open colony, half-way houses and other inmates allowed to leave unescorted may possess computers, game consoles, mobile (smart) phones and have internet access. Inmates allocated to an ordinary regime group in prisons and correction houses may possess a computer or game console, but have no internet access.
How are the computer systems procured?Inmates may procure computer systems in the shops operating at the correctional establishments in compliance with the procedures established by the order of the Director General of the Prison Department. When inmates are placed in the open regime – they may procure computer systems in outside stores.
How are the computer systems supervised?All purchased items are subject to mandatory inspection and accounting. All inspected items are labelled indicating the name of the owner, an item’s ID number (if available), name, date and signature of a responsible officer who inspected the computer and it should bear a stamp of the responsible administrative unit. The operating system may be reinstalled or history deleted only with the written permission of the authorized administrative representative who inspected the computer. No internet access available.
How are manipulations prevented?No internet access in prisons and correction houses
Are there any other details that need to be mentioned?Inmates pay for the electricity consumed by their electrical devices in compliance with the established procedure
This content is only available to registered members of EuroPris.
This content is only available to registered members of EuroPris.
This content is only available to registered members of EuroPris.
If inmates want to use such appliance, they have to submit application and they are notified on the decision. If the application for possession is granted, they have to cover the costs of examination. Inmates could possess computers but without access to internet, so without modem. In Open Units inmates have internet access; they can possess cell phones and computers with the access to internet.
Does a legal basis for computer systems exist?In Slovenian Enforcement of Penal Sanctions Act (ZIKS-1) in Article 75 option of use of electronic communications exists: “(5) Convicted persons may also use other electronic communications (e-mail, internet, GSM mobile service, fax communications, voice mail, and SMS services) provided that the use of these communications does not jeopardize security inside and outside the prison.” Within the Rules on the enforcement of punishments of imprisonment this possibility is more detailed described in Art. 58: “(1) Before the beginning of its use, a technical device shall be technically inspected at the expense of the convict by a person who performs an inspection of technical objects for the institution. (2) The device referred to in the preceding paragraph shall be re-inspected in case of suspicion of misuse. In this case, the institution shall deposit the costs of the examination in advance and charge them to the convict in the event of established abuse. (3) The inspection of devices referred to in the first and second paragraphs of this Article shall establish and prevent the entry of unauthorized items and devices or components of devices that may enable unauthorized means of electronic communication. (4) A person who performs an inspection of technical objects for an institution shall perform the inspection referred to in the first and second paragraphs of this Article by inspecting only the technical structure of the installation and not inspecting the data and other contents in the installation. (5) At the request of the convicted person, the director of the institution shall allow the possession and use of a means of electronic communication if the technical conditions for the use of this device are provided in the institution and if it is assessed that its use will not endanger safety inside and outside the institution. (6) If a convicted person abuses a device by endangering safety inside or outside the institution, the device shall be confiscated and handled in accordance with Article 78 of these Rules.”
What kind of computer systems are permitted?See answer 2 on the legal basis.
How are the computer systems procured?See answer 2 on the legal basis.
How are the computer systems supervised?Prison governor may decide, within the framework of the enforcement of penal sanctions and the maintenance of order and discipline in the prison, to introduce security measures by recording and storing the record of telephone calls and other electronic communications on the basis of the need for security measures to provide security for prisoners, prison staff and other persons in the prison, as well as the security for property and data. In introducing the measure of protecting and recording, as well as retaining records of electronic communications, the provisions of the act governing electronic communications and acts governing the protection of the secrecy, confidentiality and security of electronic communications and storage of data on traffic in electronic communications shall be applied mutatis mutandis.
How are manipulations prevented?If a convicted person abuses a device by endangering safety inside or outside the institution, the device shall be confiscated.
Are there any other details that need to be mentioned?/
We understand the question that do prisoners have access and use IT, rather than own. There are various areas in a prison where the prisoners can use IT. E.G. In Education, Workshops In Cell technology provided by us.
Does a legal basis for computer systems exist?The Offender Management 2014 made use of IT by prisoners illegal, but there are exemptions such as mentioned previously. These have to be approved locally after a risk assessment by security. Or by central authority depending on the system used.
What kind of computer systems are permitted?There is no single system. But some such as for education, industries and other systems as deemed necessary as appropriate to aid in rehabilitation.
How are the computer systems procured?It will depend on the size and if it is local or nationally based and supplied. All requests follow a strict process of business justification and approval. The Cyber and InfoSec teams liaise to oversee and provide Technical and other assurances and controls including Data Protection. NCSC and Cabinet Office guidelines are followed in the controls required.
How are the computer systems supervised?Where appropriate there is supervision by staff, with suitable controls in place technically. While others such as In Cell will be unsupervised but again with suitable technical controls in place.
How are manipulations prevented?Depending on the equipment/systems involved. This will be by technical controls, along with regular monitoring and audits. Also physical e.g. port blockers.
Are there any other details that need to be mentioned?We are a central government department that follows strictly instructions and guidance from NCSC and the Cabinet Office. We also adhere to legislation such as Surveillance, GDPR, Computer Misuse etc.
Computers can be used jointly and under supervision in the classrooms. Inmates can rent a highly secured desktop for personal use in their own cell, but it is impossible to connect to the internet or to communicate with anyone outside the prison. Game consoles can be used under the same conditions, as long as it is impossible to make a connection to the outside world. The security is always managed by the internal ICT department of the Directorate General Penitentiary Institutions.
Does a legal basis for computer systems exist?This is not regulated by law. However, the prison administration has administrative guidelines regarding the conditions under which prisoners can rent a computer.
What kind of computer systems are permitted?The desktops the detainees can rent have a standard configuration and are purchased and secured by the Directorate General Penitentiary Institutions. The detainees cannot choose the configuration they wish to purchase. The devices in the training rooms allow to organize training courses in cooperation with the communities, via VPN connections to secured Moodle servers.
How are the computer systems procured?All devices have a secure configuration that blocks adjustments to settings, installation of software, etc. The devices are used in a stand-alone setup or in a highly secured separate network on which, among other things, a self-managed firewall ensures that communication to the outside world is blocked.
How are the computer systems supervised?All devices have a secure configuration that blocks adjustments to settings, installation of software, etc. The devices are used in a stand-alone setup or in a highly secured separate network on which, among other things, a self-managed firewall ensures that communication to the outside world is blocked.
How are manipulations prevented?See answer 5.
Are there any other details that need to be mentioned?mentioned? In the coming months, the Digitization Detention Service will develop a service/learning platform. The aim is to launch a tender, with a view to making such a platform available in all cells. The platform will offer secure communication, education and entertainment (VoIP, VoD, virtual desktop, video streaming, games, etc.).
Inmates in their cells are allowed to have the following devices: TV, water boiler, fan, MP3 or radio, reading lamp, light bulb, CD player, cassette and radio cassette. These are electronics that inmates can purchase from the CIRE, which is a public company belonging to the Ministry of Justice, whose main mission is to foster the reintegration of inmates in the labour market. These items are checked and labelled by the prison and are also sealed so that cannot be dismantled in order to prevent inmates from hiding unauthorised objects inside. The labelling allows to identify the owner and together with the sealing, serves to detect any possible non-consented manipulation of the device. Inmates are also allowed to have a computer if required for their studies. Its use is enabled to the extent required by the studies that need to be completed by the inmate
Does a legal basis for computer systems exist?The legal framework regulating the requirements for inmates to have a computer in their cells is foreseen by Instruction 3/2010 issued by the prison Administration (Instrucció 3/2010 reguladora de la tinença I procés d’adquisició d’equips informatics i aparells electrodomèstics per part dels interns dels centres penitenciaris de Catalunya). Articles 1 to 8 describe the purposes that the computers shall serve for individual use by an inmate, which should be exclusively for educative purposes. The process for the inmate to apply for it, explaining the curricula of the studies s/he wishes to undertake and a specific plan, the decision making process by the prison management and the inspections and security checks the computer must undergo, are also regulated in the Instruction. The education team of the prison will report on the studies’ plan submitted by the inmate and the prison management will decide whether to allow the computer or not. Once authorised, the inmate shall sign a document stating that s/he is fully aware of the regulations on computers and the type of use he is expected to do of his/hers
What kind of computer systems are permitted?The computer comprises screen, keyboard, mouse and CPU. All these components must be kept duly sealed. Laptops are not allowed.
How are the computer systems procured?The computer shall be bought from the catalogue offered by the CIRE and will be charged to the inmate’s account.
How are the computer systems supervised?These computers have to undergo a security check before entering the prison, and then are labelled and sealed by the prison staff to prevent manipulation. The prison education team will report periodically on the progress made by the inmate on his/her studies and the security staff will also check the computer regularly and at least every 3 months, to ensure that is not being wrongly manipulated. The inmate must accept any kind of monitoring or inspection of the labels and seals on the CPU, screen, keyboard or mouse, when conducted by the prison staff, who will also inspect the software installed on the computer. The inmate is not allowed to put any passwords to access any software or files in the computer.
How are manipulations prevented?The inmate signs a statement where s/he commits to make a proper use of the computer and is aware of the obligations it entails, including allowing the prison staff to inspect both hardware and software. If any part of the computer appears to have been manipulated or to have the seal broken, the prison staff will withdraw the computer from the inmate and a disciplinary procedure will be initiated.
Are there any other details that need to be mentioned?Computers cannot connect to any kind of networks. Any device that the inmates takes out of the prison, cannot be used inside the prison again. Instruction 3/2010 should be updated as it does not allow to purchase laptops.
This content is only available to registered members of EuroPris.
This content is only available to registered members of EuroPris.