摘要:
Systems and methods are shown which provide processor-based self-service systems for use with respect to controlled environment facilities. Embodiments provide processor-based self-service systems having robust input/output capabilities in order to support a wide range of functionality. Processor-based self-service systems of embodiments are adapted to be deployed within a controlled environment facility, such as within a lobby area, a holding area, and/or a restricted area of a controlled environment facility. According to embodiments, processor-based self-service systems are used with respect to a plurality of functions and a plurality of users, thereby processing a variety of information associated with a controlled environment facility. Embodiments operate to aggregate, compile, correlate, and link information to provide data heretofore unavailable from separate or manual systems used with respect to controlled environment facilities.
摘要:
System and method for monitoring activity of detainees comprising identifying a detainee who is affiliated with a gang, searching one or more databases for information associated with the detainee, and correlating the information to identify individuals who may be affiliated with the gang. The databases may include call record databases, and the information associated with the detainee may include individuals called by the detainee, individuals who visit the detainee, telephone numbers called by the detainee, and sources of funding for the detainee's calls voice and/or facial biometric identifiers. An alert may be triggered when the detainee calls a specified individual or telephone number.
摘要:
Disclosed are systems and methods which allow a calling party to store messages for a called party even if the called party does not already have message storage facilities, provided the calling party and/or called party meet certain parameters. Delivery of the message is controlled by the called party and may require the called party to agree to pay for the message delivery service. In a further embodiment, a call processing system is operable to screen outgoing calls from various callers according to a first set of criteria and if a call is not completed to a called party a second set of criteria is used to determine if a message can be stored awaiting retrieval by the called party. If desired, a return message from a called party to a calling party can be stored.
摘要:
Disclosed are systems and methods which allow a calling party to store messages for a called party even if the called party does not already have message storage facilities, provided the calling party and/or called party meet certain parameters. Delivery of the message is controlled by the called party and may require the called party to agree to pay for the message delivery service. In a further embodiment, a call processing system is operable to screen outgoing calls from various callers according to a first set of criteria and if a call is not completed to a called party a second set of criteria is used to determine if a message can be stored awaiting retrieval by the called party. If desired, a return message from a called party to a calling party can be stored.
摘要:
Systems and methods which detect unauthorized, impermissible, or otherwise undesired call activity through the use of one or more third party databases are shown. For example, a controlled environment facility information management system may access a database external thereto, such as a victim notification database, which is created and maintained by a third party unrelated to the controlled environment facility. Such third party database access may be accomplished at the point of call validation or caller verification for determining the treatment of the call (e.g., allowed, blocked, allowed with limitations, etcetera). Such call treatment determinations may be made with respect a particular prisoner or other resident of the controlled environment facility making the call, may be made with respect to all calls made from a particular controlled environment facility, may he made with respect to a group of controlled environment facilities, etcetera.
摘要:
Disclosed are systems and methods which provide availability of information on a network wide basis, with the network or information technology (IT) fabric spanning a wide range of institutions and other sources of information, including correctional facilities, without regard to which jurisdiction the source of information belongs, e.g. police, courts, federal investigation agencies, public databases etcetera. Embodiments provide an electronic based capability to identify useful information and for locating, collecting, compiling, aggregating, distilling, and/or reporting robust data.
摘要:
Systems or methods for managing transactions within a controlled environment facility provide an information management engine integrating transaction functionality and telephone calling functionality, establish an account associated with a resident of the controlled environment facility, and use the information management engine to conduct transactions associated with residents of the controlled environment facility. The transactions include at least requests, by the resident, for deposits into the account by a party outside of the controlled environment facility. The systems or methods accept requests from the resident and utilize the telephone calling services of the information management engine to facilitate the request for deposit. The systems or methods may place calls to the individuals outside the controlled environment facility to interact with the individual, request the deposit and accept such deposits.
摘要:
Systems and methods which detect unauthorized, impermissible, or otherwise undesired call activity through the use of one or more third party databases are shown. For example, a controlled environment facility information management system may access a database external thereto, such as a victim notification database, which is created and maintained by a third party unrelated to the controlled environment facility. Such third party database access may be accomplished at the point of call validation or caller verification for determining the treatment of the call (e.g., allowed, blocked, allowed with limitations, etcetera). Such call treatment determinations may be made with respect a particular prisoner or other resident of the controlled environment facility making the call, may be made with respect to all calls made from a particular controlled environment facility, may be made with respect to a group of controlled environment facilities, etcetera.
摘要:
Systems and methods which detect unauthorized, impermissible, or otherwise undesired call activity through the use of one or more third party databases are shown. For example, a controlled environment facility information management system may access a database external thereto, such as a victim notification database, which is created and maintained by a third party unrelated to the controlled environment facility. Such third party database access may be accomplished at the point of call validation or caller verification for determining the treatment of the call (e.g., allowed, blocked, allowed with limitations, etcetera). Such call treatment determinations may be made with respect a particular prisoner or other resident of the controlled environment facility making the call, may be made with respect to all calls made from a particular controlled environment facility, may be made with respect to a group of controlled environment facilities, etcetera.
摘要:
Systems or methods for managing transactions within a controlled environment facility provide an information management engine integrating transaction functionality and telephone calling functionality, establish an account associated with a resident of the controlled environment facility, and use the information management engine to conduct transactions associated with residents of the controlled environment facility. The transactions include at least requests, by the resident, for deposits into the account by a party outside of the controlled environment facility. The systems or methods accept requests from the resident and utilize the telephone calling services of the information management engine to facilitate the request for deposit. The systems or methods may place calls to the individuals outside the controlled environment facility to interact with the individual, request the deposit and accept such deposits.