Morse Watchmans Solutions Enable Compliance with Detention Center Rules and Policies

Morse Watchmans Solutions Enable Compliance with Detention Center Rules and Policies

Morse Watchmans Solutions Enable Compliance with Detention Center Rules and PoliciesAs the facility coordinator for New Mexico’s Bernalillo County Metropolitan Detention Center (MDC), Randy Donahoe follows strict guidelines, policies and procedures to ensure that security and control of the facility are maintained. Among the many tools at his disposal, Donahoe counts the Morse Watchmans KeyWatcher key control and management system as essential to this task.

“The KeyWatcher system does everything needed in a correctional environment including compliance with the ACA standard for key control,” said Donahoe. “The Morse Watchmans’ system ensures that our keys are properly stored, controlled and accounted for.”

The MDC is a 500,000 square foot direct supervision detention facility designed to provide state-of-the-art security and treatment programs for Bernalillo County. The regional jail is located in a fully self-contained, 150-acre campus about 15 miles west of Albuquerque with a medical treatment suite, booking/intake center, administration space and a kitchen, along with maximum, medium and minimum security inmate holding areas. The facility houses an average population of more than 2,800 and employs a staff of more than 500. It is ranked 39th in size and considered a mega jail among the 3,300 jails in the United States. On average, 40,000 inmates are processed annually through the MDC.

The KeyWatcher Key Control System from Morse Watchmans, in use at MDC since 2007, controls access to the large number of keys used throughout the facility. When an officer or other pre-authorized user needs to access the key cabinet to retrieve or return a key, that individual must swipe their access card, and then input their PIN code. If that PIN matches the information stored in the system database, the cabinet can be opened. Keys stored within the cabinet are attached to a locking mechanism, and only those keys which the user is authorized to access will be released. All other keys will remain locked in place and all activity is recorded.

According to Donahoe, the controlled access to facility keys enabled by the KeyWatcher system not only helps to meet the American Correctional Association (ACA) standard but has improved their key control procedures by automating the key control access and tracking. He said, “From my computer, I can access the system to see which keys are out, who has keys out and when they are scheduled to be returned. If a key is missing, I can use the system to determine who last used that key. The system design has prevented issues we might have otherwise encountered in controlling and managing such a large number of keys.”

Donahoe continued, “The KeyWatcher system gives us accurate and complete user information instantly, and operation has been easy for our staff to learn and use. Overall, it’s allowed for more accountability and control.”

The KeyWatcher system has helped to create a safer and more secure environment for staff, visitors and inmates at the Bernalillo County Metropolitan Detention Center. And, as Donahoe said, “The KeyWatcher system has made it easier for everyone to comply with policies and procedures in the performance of their job.”

*Pictured above: Randy Donahoe of Bernalillo County Metropolitan Detention Center.

 

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • How a Security System Can Enhance Arena Safety and the Fan Experience

    Ensuring guests have both a memorable experience and a safe one is no small feat for your physical security team. Stadiums, ballparks, arenas, and other large event venues are increasingly leveraging new technologies to transform the fan experience and maintain a high level of security. The goal is to preserve the integrity and excitement of the event while enhancing security and remaining “behind the scenes.” Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

Featured Cybersecurity

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3