Suspected illicit drugs/use other than marijuana

PICs should use the following information to make determinations about whether a patron is in possession, under the influence of, or has used illicit drugs on library premises.

Determining Use

A PIC should use the identifying characteristics below and incident circumstances to make determinations about illicit drug use. Because illicit drugs can only be positively identified through lab testing, PICs must rely on their observations and training to make determinations about rule violations and exclusions. Additionally, PICs should not attempt to identify the specific drug no matter what they see, smell, or hear, but should include descriptions of items, substances, and odors. It is important to know that odors smell differently to different people and drugs are often cut together which masks or changes smells.

The following are examples of odors, smells, paraphernalia, or physical appearance that may be associated with illicit substances and suggested language for documenting in incident reports.

Examples of what you may see

  • “A red in color liquid”
  • “A blue in color pill with a “M” marked on it”
  • “A clear crystal substance”
  • “A blue in color powder”
  • “A crystalline powder”
  • “Glass like rocks”
  • “A waxy, gooey oil”
  • “An unknown pill, or a pill with marking”
  • “A blue in color pill”
  • “Appears to be a smoking pipe”
  • “Appears to be an inhaling tube or straw”
  • “Appears to be tin foil for drug use”
  • “A lighter was observed”
  • “A syringe with unknown substance”

Examples of what you may smell

  • “A sweet chemical or cleaning product smell”
  • “A slight aroma of sugar with a smell of burning or burnt aluminum foil”
  • “A sour or skunk smell”

Examples of behaviors

  • “Person was unresponsive”
  • “Person was incoherent”
  • “Person was agitated, waving hands and pacing”

Exclusion Guidelines

If there is reasonable belief* to suggest illicit drug use or possession on library premises, PICs should follow exclusion guidelines for a rule one violation and follow procedures for writing the security incident report.

*Reasonable belief: takes the totality of the evidence (observation of materials, behaviors, actions, communication, etc.) into account and uses the metric: “would a reasonable person believe that the activity is or has taken place?” If the answer is yes then proceed with the rule violation procedures.