摘要:
Systems and methods which detect unauthorized, impermissible, or otherwise undesired call activity through the use of one or more third-party databases are shown. For example, a controlled environment facility information management system may access a database external thereto, such as a victim notification database, which is created and maintained by a third party unrelated to the controlled environment facility. Such third-party database access may be accomplished at the point of call validation or caller verification for determining the treatment of the call (e.g., allowed, blocked, allowed with limitations, etcetera). Such call treatment determinations may be made with respect a particular prisoner or other resident of the controlled environment facility making the call, may be made with respect to all calls made from a particular controlled environment facility, may be made with respect to a group of controlled environment facilities, etcetera.
摘要:
Systems or methods for managing transactions within a controlled environment facility provide an information management engine integrating transaction functionality for establishing an account associated with a resident of the controlled environment facility, and use the information management engine to conduct transactions associated with residents of the controlled environment facility. The transactions include at least distant deposits into the account by a party outside of the controlled environment facility. The systems or methods accept requests from the resident and facilitate the request for deposit. The systems or methods may place calls to the individuals outside the controlled environment facility or to interact with the individual. During such calls a deposit request may be made and the deposit accepted.
摘要:
Systems and methods which determines the likelihood that a calling (or in some cases the called) user will pay for a particular auxiliary service are described. A system of an embodiment considers the user's credit risk and his/her propensity to pay, when deciding if the user is eligible for a particular auxiliary service. A methodology used for determining propensity to pay for an auxiliary service according to embodiments is independent from a determination of propensity to pay for a basic calling service. Thus, the criteria used, and the weight given to each criteria, for determining eligibility for auxiliary services can be different from the criteria and criteria weight used for basic communication connections.
摘要:
Systems and methods which determines the likelihood that a calling (or in some cases the called) user will pay for a particular auxiliary service are described. A system of an embodiment considers the user's credit risk and his/her propensity to pay, when deciding if the user is eligible for a particular auxiliary service. A methodology used for determining propensity to pay for an auxiliary service according to embodiments is independent from a determination of propensity to pay for a basic calling service. Thus, the criteria used, and the weight given to each criteria, for determining eligibility for auxiliary services can be different from the criteria and criteria weight used for basic communication connections.