diff --git a/en_US.ISO8859-1/books/arch-handbook/jail/chapter.xml b/en_US.ISO8859-1/books/arch-handbook/jail/chapter.xml
index 0cd77ee50e..c08d2584d6 100644
--- a/en_US.ISO8859-1/books/arch-handbook/jail/chapter.xml
+++ b/en_US.ISO8859-1/books/arch-handbook/jail/chapter.xml
@@ -139,7 +139,7 @@ j.ip_number = ntohl(in.s_addr);</programlisting>
       </sect3>
 
       <sect3>
-        <title>Jailing The Process</title>
+        <title>Jailing the Process</title>
 
         <para>Finally, the userland program jails the process.
           <application>Jail</application> now becomes an imprisoned
@@ -224,7 +224,7 @@ SYSCTL_INT(_security_jail, OID_AUTO, mount_allowed, CTLFLAG_RW,
       </sect3>
 
       <sect3>
-        <title>&man.jail.2; system call</title>
+        <title>&man.jail.2; System Call</title>
 
         <para>Like all system calls, the &man.jail.2; system call takes
           two arguments, <literal>struct thread *td</literal> and
@@ -617,7 +617,7 @@ socreate(int dom, struct socket **aso, int type, int proto,
         contains the port, address, length and domain family of the socket
         which is to be bound. Basically, this disallows any processes from
         <application>jail</application> to be able to specify the address
-        that doesn't belong to the <application>jail</application> in which
+        that does not belong to the <application>jail</application> in which
         the calling process exists.</para>
 
       <programlisting><filename>/usr/src/sys/netinet/in_pcb.c</filename>: