Who Owns GUARDIAN RFID Data?
Some of the most common questions we receive from customers and potential customers concern data ownership: Who owns the data created digitally when we use the GUARDIAN RFID System? Do we own the data? How do we access it?
In this blog, we’ll answer these questions for you. Whether you’re involved in the legal, technical, or operational side of corrections, this blog will help you learn more about the GUARDIAN RFID System.
There are three key areas of data involved in the GUARDIAN RFID System, each of which has a lawful owner:
Customer Information
GUARDIAN RFID Information
Inmate Data
1. Customer Information
“Customer Information” refers to all confidential or proprietary information you disclose to GUARDIAN RFID. Examples include the names of end-users, housing assignment information, and paper-based forms and reports that you send to our team. Any Customer Information you disclose to us remains your property.
2. GUARDIAN RFID Information
“GUARDIAN RFID Information” encompasses all confidential or proprietary information GUARDIAN RFID discloses to you. Examples include agreement forms, development documentation, server diagrams, and checklists of information we send you. Any confidential or proprietary information we disclose to you remains our property.
3. Inmate Data
Inmate Data is defined as any inmate management, monitoring, or tracking data collected as part of your use of the GUARDIAN RFID System. Examples include records of cell checks, face-to-face observations, inmate movements, and program attendance. As the customer, you will own all Inmate Data.
Exporting Inmate Data
During the term of your agreement with us, you may access Inmate Data either by using the built-in platform tools to export your data or by requesting that we export your data into a file format that follows server best practices, such as CSV or XML. If you are unable or choose not to continue using GUARDIAN RFID, we will assist you in obtaining a copy of the Inmate Data in a similar file format at the time our relationship ends.
Who Can Access Our Data?
It is entirely up to you who has privileges to access your agency’s Inmate Data. Within GUARDIAN RFID, you define user access, limiting or extending access to specific modules, reports, custom workflows, and more. Our Database Administrator has direct access to your data as part of their core responsibility to back up and ensure your data is available to your team 24/7.
All of the data you generate is legally defensible. It cannot be edited, backdated, or deleted once it is saved. If you make a logging mistake, you can only correct it by logging a new entry, not by modifying an existing entry.
About GUARDIAN RFID
GUARDIAN RFID debuted its Software as a Service platform in late 2006, and since that time, we’ve captured and stored (cumulatively) billions of activity logs. In 2019, we captured well over one billion logs in a single year, so our practice of scaling and supporting our cloud infrastructure and deployments is well established, as are questions about data ownership and intellectual property rights.
If you have more questions about data ownership, access, or other Cloud security questions, please email warriors@guardianrfid.com.