Morse Watchmans Solutions Enable Compliance with Detention Center Rules and Policies

Morse Watchmans Solutions Enable Compliance with Detention Center Rules and Policies

Morse Watchmans Solutions Enable Compliance with Detention Center Rules and PoliciesAs the facility coordinator for New Mexico’s Bernalillo County Metropolitan Detention Center (MDC), Randy Donahoe follows strict guidelines, policies and procedures to ensure that security and control of the facility are maintained. Among the many tools at his disposal, Donahoe counts the Morse Watchmans KeyWatcher key control and management system as essential to this task.

“The KeyWatcher system does everything needed in a correctional environment including compliance with the ACA standard for key control,” said Donahoe. “The Morse Watchmans’ system ensures that our keys are properly stored, controlled and accounted for.”

The MDC is a 500,000 square foot direct supervision detention facility designed to provide state-of-the-art security and treatment programs for Bernalillo County. The regional jail is located in a fully self-contained, 150-acre campus about 15 miles west of Albuquerque with a medical treatment suite, booking/intake center, administration space and a kitchen, along with maximum, medium and minimum security inmate holding areas. The facility houses an average population of more than 2,800 and employs a staff of more than 500. It is ranked 39th in size and considered a mega jail among the 3,300 jails in the United States. On average, 40,000 inmates are processed annually through the MDC.

The KeyWatcher Key Control System from Morse Watchmans, in use at MDC since 2007, controls access to the large number of keys used throughout the facility. When an officer or other pre-authorized user needs to access the key cabinet to retrieve or return a key, that individual must swipe their access card, and then input their PIN code. If that PIN matches the information stored in the system database, the cabinet can be opened. Keys stored within the cabinet are attached to a locking mechanism, and only those keys which the user is authorized to access will be released. All other keys will remain locked in place and all activity is recorded.

According to Donahoe, the controlled access to facility keys enabled by the KeyWatcher system not only helps to meet the American Correctional Association (ACA) standard but has improved their key control procedures by automating the key control access and tracking. He said, “From my computer, I can access the system to see which keys are out, who has keys out and when they are scheduled to be returned. If a key is missing, I can use the system to determine who last used that key. The system design has prevented issues we might have otherwise encountered in controlling and managing such a large number of keys.”

Donahoe continued, “The KeyWatcher system gives us accurate and complete user information instantly, and operation has been easy for our staff to learn and use. Overall, it’s allowed for more accountability and control.”

The KeyWatcher system has helped to create a safer and more secure environment for staff, visitors and inmates at the Bernalillo County Metropolitan Detention Center. And, as Donahoe said, “The KeyWatcher system has made it easier for everyone to comply with policies and procedures in the performance of their job.”

*Pictured above: Randy Donahoe of Bernalillo County Metropolitan Detention Center.

 

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3