Some of the most common questions we receive from customers and potential customers are about data ownership: Who owns the data that’s digitally created when we use the GUARDIAN RFID System? Do we own the data? How do we get access to it? 

In this blog, we’ll answer these common questions for you. Whether you’re on the legal, technical, or operational side of corrections, this blog will help you learn more about the GUARDIAN RFID System. 

There are three key areas of data involved in the GUARDIAN RFID System, each of which has a respective, lawful owner: 

  1. Customer Information 
  2. GUARDIAN RFID Information 
  3. Inmate Data 


1. Customer Information 

“Customer Information” is all confidential or proprietary information you disclose to GUARDIAN RFID. Examples include names of end-users, housing assignment information, and paper-based forms and reports that you send to our team. Any Customer Information you disclose to us remains your property.


2. GUARDIAN RFID Information 

“GUARDIAN RFID Information” is all confidential or proprietary information GUARDIAN RFID discloses to you. Examples include agreement forms, development documentation, server diagrams, and checklists of information we send you. Any confidential or proprietary information we disclose to you remains our property. 


3. Inmate Data 

Inmate Data is defined as any inmate management, monitoring, or tracking data collected as part of your use of the GUARDIAN RFID System. Examples include records of cell checks, face-to-face observations, inmate movements, and programs attendance.
As the Customer, you will own all Inmate Data. 

Exporting Inmate Data 

During the term of your agreement with us, you may access Inmate Data by either using the built-in platform tools to export your data or requesting that we export your data into a file format that follows server best practices, such as CSV or XML. If you cannot or choose not to continue using GUARDIAN RFID, we’ll help you get a copy of the Inmate Data in a similar file format at the time our relationship ends.

Who Can Access our Data

It’s completely up to you who has privileges to access your agency’s Inmate Data. Within GUARDIAN RFID, you define user access, limiting or extending access to named modules, reports, custom workflows, and more. When it comes to GUARDIAN RFID, our Database Administrator has direct access to your data. One core responsibility is to backup and make sure your data is available to your team 24x7.


All of the data you generate is legally defensible. It cannot be edited, backdated, or deleted once it’s saved. If you were to make a logging mistake, you can only correct it by logging a new entry, not modifying an existing entry.

About GUARDIAN RFID

GUARDIAN RFID debuted its Software as a Service platform in late 2006, and since that time, we’ve captured and stored (cumulatively) billions of activity logs. In 2019, we captured well over one billion logs in a single year, so our practice of scaling and supporting our cloud infrastructure and deployments is well established, as are questions about data ownership and intellectual property rights. 


If you have more questions about data ownership, access, or other Cloud security questions, please email warriors@guardianrfid.com.