Morse Watchmans Solutions Enable Compliance with Detention Center Rules and Policies

Morse Watchmans Solutions Enable Compliance with Detention Center Rules and Policies

Morse Watchmans Solutions Enable Compliance with Detention Center Rules and PoliciesAs the facility coordinator for New Mexico’s Bernalillo County Metropolitan Detention Center (MDC), Randy Donahoe follows strict guidelines, policies and procedures to ensure that security and control of the facility are maintained. Among the many tools at his disposal, Donahoe counts the Morse Watchmans KeyWatcher key control and management system as essential to this task.

“The KeyWatcher system does everything needed in a correctional environment including compliance with the ACA standard for key control,” said Donahoe. “The Morse Watchmans’ system ensures that our keys are properly stored, controlled and accounted for.”

The MDC is a 500,000 square foot direct supervision detention facility designed to provide state-of-the-art security and treatment programs for Bernalillo County. The regional jail is located in a fully self-contained, 150-acre campus about 15 miles west of Albuquerque with a medical treatment suite, booking/intake center, administration space and a kitchen, along with maximum, medium and minimum security inmate holding areas. The facility houses an average population of more than 2,800 and employs a staff of more than 500. It is ranked 39th in size and considered a mega jail among the 3,300 jails in the United States. On average, 40,000 inmates are processed annually through the MDC.

The KeyWatcher Key Control System from Morse Watchmans, in use at MDC since 2007, controls access to the large number of keys used throughout the facility. When an officer or other pre-authorized user needs to access the key cabinet to retrieve or return a key, that individual must swipe their access card, and then input their PIN code. If that PIN matches the information stored in the system database, the cabinet can be opened. Keys stored within the cabinet are attached to a locking mechanism, and only those keys which the user is authorized to access will be released. All other keys will remain locked in place and all activity is recorded.

According to Donahoe, the controlled access to facility keys enabled by the KeyWatcher system not only helps to meet the American Correctional Association (ACA) standard but has improved their key control procedures by automating the key control access and tracking. He said, “From my computer, I can access the system to see which keys are out, who has keys out and when they are scheduled to be returned. If a key is missing, I can use the system to determine who last used that key. The system design has prevented issues we might have otherwise encountered in controlling and managing such a large number of keys.”

Donahoe continued, “The KeyWatcher system gives us accurate and complete user information instantly, and operation has been easy for our staff to learn and use. Overall, it’s allowed for more accountability and control.”

The KeyWatcher system has helped to create a safer and more secure environment for staff, visitors and inmates at the Bernalillo County Metropolitan Detention Center. And, as Donahoe said, “The KeyWatcher system has made it easier for everyone to comply with policies and procedures in the performance of their job.”

*Pictured above: Randy Donahoe of Bernalillo County Metropolitan Detention Center.

 

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3