The vendor is required to provide a comprehensive and modern inmate banking and commissary system.
- Implementing and maintaining a fully integrated, cloud-based ecosystem that streamlines inmate financial management, commissary operations, and related services within the county detention facility.
- Inmate banking and commissary system:
1. Cloud-based ecosystem:
• The entire system must be hosted in a secure, reliable, and scalable cloud environment.
• The company must ensure system availability, data security, and disaster recovery capabilities.
• Office requires access to the system via secure web-based interfaces.
• System must be accessible from authorized locations and devices as configured by office.
• The company must manage all aspects of cloud infrastructure, including maintenance, updates, and security patching.
2. Inmate accounting and financial management:
• Comprehensive inmate account management:
○ Individual inmate accounts for deposit, withdrawal, and transaction tracking.
○ Support for various deposit methods, including but not limited to cash, credit/debit cards, and money orders.
○ Automated posting of funds from authorized sources (e.g., release funds, external deposits).
○ Real-time balance updates and transaction history accessible to authorized staff.
○ Secure management of inactive and released inmate accounts, including escheatment processes as required by law.
• Commissary and goods purchasing:
○ Intuitive touch-enabled web-based inmate-user interface allowing inmates to place orders from inmate tablets or kiosks, as needed.
○ Automated deduction of commissary purchases from inmate accounts.
○ Management of purchase limits and restrictions based on facility rules, housing location, and individual inmate status.
○ Support for various commissary product categories and pricing structures.
○ Include dietary and nutritional information of all products sold to inmates.
○ Provide pricing information for all items sold to inmates on a regular basis.
○ Provide notice to facility and inmates thirty (30) days prior to any adjustments, additions, or changes to commissary menu offerings.
• Funds transfers and disbursements:
○ Secure inmate-to-inmate fund transfer capabilities with configurable controls and approvals.
○ Automated processing of inmate release funds and disbursements via various methods (e.g., checks, prepaid cards, etc.).
○ Detailed audit trails for all fund transfers and disbursements.
○ Automated and secure company-to-company fund transfer capabilities to allow inmates to transfer funds from trust to current and future communication company accounts.
○ Return funds received after an inmate’s release directly to the inmate without the facility’s intervention.
3. Inmate debt management:
• Automated debt tracking:
○ Systematic tracking of inmate debts, including medical co-pays, booking fees, restitution, and other authorized deductions or transactions.
○ Configurable debt prioritization and repayment schedules.
○ Automated deduction of debt payments from inmate account deposits.
○ Automated assessment of fees specified by the facility against inmate accounts on an established frequency or under specific conditions.
○ Clear and transparent communication of debt balances and payment history to inmates.
• Debt management tools:
○ Tools for authorized staff to manage and adjust debt amounts, payment plans, and waivers.
○ Ability to backdate corrective transactions by authorized staff.
○ Reporting on outstanding debt balances, collection rates, and debt aging.
○ Integration with commissary purchasing to allow for debt repayment through commissary spending, if desired by Office.
4. Bank reconciliation and audit controls:
• Automated bank reconciliation:
○ Automated reconciliation of all inmate funds accounts with bank statements.
○ Real-time visibility into cash positions and account balances.
○ Exception reporting and alerts for discrepancies and reconciliation issues.
○ Comprehensive audit logs of all financial transactions and reconciliation activities.
• Robust audit trails and reporting:
○ Detailed audit trails for all system activities, including user access, transactions, and configuration changes.
○ Compliance with relevant financial regulations and audit standards.
○ Secure and auditable record-keeping for all inmate financial data.
5. Fraud management and investigative tools:
• Proactive fraud detection:
○ System features to identify and flag potentially fraudulent transactions and activities.
○ Configurable rules and alerts for suspicious patterns and anomalies.
○ Real-time monitoring of transactions for fraud prevention.
• Investigative capabilities:
○ Tools for authorized staff to investigate suspected fraud, including transaction tracing, account analysis, and reporting.
○ Secure access to transaction history and audit logs for investigative purposes.
○ Reporting and analysis tools to identify fraud trends and patterns.
6. Robust reporting and business intelligence capabilities:
• Standard and customizable reports:
○ Comprehensive library of standard reports covering all aspects of inmate banking and commissary operations (e.g., financial summaries, transaction reports, commissary sales, debt balances).
○ Ability for office staff to create and customize reports based on specific data requirements and parameters.
○ Flexible report delivery options (e.g., scheduled reports, on-demand generation, various file formats).
• Business intelligence dashboard:
○ Interactive dashboard providing real-time insights into key performance indicators (KPIS) and operational metrics.
○ Visualizations and data analysis tools to support data-driven decision-making.
○ Configurable dashboard views and widgets to meet the needs of different user roles.
7. User-friendly interface and access configuration suite:
• Intuitive user interfaces:
○ User-friendly interfaces for all user roles, including detention staff, administrative personnel, and inmates (where applicable).
○ Role-based access control to ensure appropriate data access and system functionality.
○ Clear and concise navigation and workflows for efficient system operation.
• Access configuration and security:
○ Comprehensive access configuration suite to define user roles, permissions, and security settings.
○ Multi-factor authentication options for enhanced security.
○ Single-sign-on support for facility staff.
○ Regular security audits and penetration testing to ensure system integrity.
8. System integration:
• Jail management system (JMS) integration:
○ Seamless integration with the office current jail management system (Tyler technologies).
○ Automated data exchange between the inmate banking and commissary system and the JMS, including inmate demographics, booking information, release dates, and disciplinary status.
○ Real-time synchronization of relevant data across all systems.
• Inmate communications platform integration:
○ Integration with Office current and future inmate communications platform(s).
○ Enablement of financial transactions and commissary ordering through inmate accessible devices, if desired by office.
9. Implementation, training, and support:
• Comprehensive implementation plan:
○ Detailed implementation plan outlining project timelines, responsibilities, and milestones.
○ Data migration and system configuration services.
○ On-site or remote implementation support.
• Training and documentation:
○ Comprehensive training for all user roles on system functionality and operation.
○ User manuals, online help resources, and training materials.
○ Ongoing training and update training, as needed.
• Ongoing technical support and maintenance:
○ Dedicated technical support team available during specified hours.
○ Service level agreements (SLAS) outlining response times and system uptime guarantees.
○ Regular system maintenance, updates, and security patches.
10. Compliance and security:
• Regulatory compliance:
○ System must comply with all relevant federal, state, and local regulations pertaining to inmate banking and commissary operations, including but not limited to PCI DSS, NCIC, and relevant banking regulations.
○ Company must demonstrate expertise in regulatory compliance within the correctional environment.
• Data security and privacy:
○ Robust security measures to protect sensitive inmate financial data and personal information.
○ Compliance with data privacy regulations and best practices.
○ Regular security assessments and vulnerability testing.
○ Disclosure of all data breaches no matter how recent or how long ago.
- Contract Period/Term: 5 years
- Mandatory Site Visit Date: April 24, 2025
- Questions/Inquires Deadline: April 28, 2025