SlideShare a Scribd company logo
The Winter 2012 Biometrics Summit
Miami, FL February 27 – March 1, 2012




    Identifying Prisoners And Visitors
                   Using
              Localized AFIS

 Mizan Rahman              Jim Rokosky
  Founder & CEO          Sr. VP, DSI Operations
 M2SYS Technology     Global Tel*Link Corporation
Who are we?
M2SYS Overview

• Biometric R&D company focus on technology innovation
  for rapid biometric adoption
• Winner of 2007 Frost & Sullivan Biometrics Technology
  Innovation of the Year Award
• Winner of 2011 Frost & Sullivan New Product Innovation
  Award
• Primary Markets Served: Public Safety – Law
  Enforcement, Electoral, Healthcare, Banking, Education,
  POS, Childcare, Transportation, Workforce Management,
  Membership Management, Application Security
• Tens of Thousands of Customer Deployments in 100
  Countries Worldwide
GTL Overview – Nationwide Presence
   Leading provider of telecom and technology products and services in the corrections industry
   Provides network based collect and prepaid call processing and digital recording infrastructure
    platforms in conjunction with monitored telecommunications systems
   Serves ~ 1,900 facilities and over 1.1 million inmates in 47 states and over 800 counties
   Holds the State Department of Corrections contract in 33 of 50 states including 14 of 20 largest




                 GTL DOC Customer
                 GTL with no DOC




                                            GTL Confidential and Proprietary                           4
M2SYS & GTL - Synergy

                                     Visitor
                                   Management




                      Biometrics



                                             Inmate
                                           Management




• M2SYS focuses on biometrics and enabling software providers to
  rapidly integrate biometric functionalities
• GTL focuses on providing end-to-end solutions for prisons
What brings us together ?
Statistics from DOJ

• Of the 272,111 persons released from prisons in 15
  States in 1994, an estimated 67.5% were rearrested
  for a felony or serious misdemeanor within 3
  years, 46.9% were reconvicted, and 25.4%
  resentenced to prison for a new crime.
• The 272,111 offenders discharged in 1994 accounted
  for nearly 4,877,000 arrest charges over their
  recorded careers.
• Sex offenders were less likely than non-sex offenders
  to be rearrested for any offense –– 43% of sex
  offenders versus 68% of non-sex offenders.
The Magic Number


                     ~ 40%
Almost 40% of the prison population are repeat offenders. Some of our
clients came up with a perfect euphemism for these offenders – “The
frequent flyers”


• The same criminals are coming back to the jails over and over again
• The same visitors are also coming back over and over again
Releasing the wrong inmate



                                          Releasing officer fails
  Swap badge with       Pretend to be      to prevent because
 someone else being   someone else with   of ethnic diversity or
     released            false badge          sophisticated
                                                execution
Need for localized AFIS

  1     • Prompt identification of
          returning offenders


  2     • Release the right inmate
          not his friend


  3     • Ensure security & prompt
          visitor processing
What drives the successful
         implementation?

• Fully integrated solutions
• Merge both companies           Integrated    Usability
  expertise to understand
  end user culture and deliver
  exactly what is needed not
                                 Versatility   Training
  what we want to sell
Challenges
• Age of users                              • Intuitive design
• Working class                             • User feedback
                                            • Footprint




                  Demography   Ergonomics




                   Weather        Cost

• Cold                                      • Biometric module
• Dry                                         can’t be more
• Wet                                         expensive then
                                              main JMS system
Who is using it?

M2SYS & GTL together deployed our integrated solutions in
  over 100 jails, managing millions of biometric records.



            Country                           Project
  Prominent private correction   70 Jails, centrally connected
  facility
  Dekalb County, Atlanta, GA     3,500 beds – largest jail in the
                                 South
Future…



                                        Adoption


                     Collaboration
                   (cloud biometrics)
                    Regional Data
                       Sharing
More integration
(medication
dispensing, move
ment tracking)
M2SYS’s Strategy
Hybrid Biometric Platform™ (HBP) is an enterprise-ready biometric recognition system that
supports fingerprint, finger vein, palm vein, and iris biometrics. HBP is “plug-and-play” with
any of these biometric modalities, ensuring near 100% read rates for any biometric
technology implementation.
                                                Features/Benefits:
                                                • One integration provides access to an
                                                  enterprise-ready, Hybrid Biometrics™
                                                  system
                                                • Immediately utilize fingerprint, finger
                                                  vein, palm vein, and iris recognition
                                                • Unlike four, separate low-level
                                                  SDKs, Hybrid Biometric Platform™ is
                                                  pre-built, scalable, easily integrated, and
                                                  lowers total cost of ownership
                                                • Ensure 100% read rates, regardless of
                                                  environmental, demographic, or other
                                                  factors that negatively impact some
                                                  forms of biometrics
GTL’s Strategy

                                    Latest Correctional
                                     Applications and Consumer
                                     Payment Technology
                                    Products/Services that
                                     Increase Call Volume and
                                     Improve Satisfaction
                                    Tools that Increase
                                     Efficiency and Effectiveness
                                     of Investigations
                                    Applications that Increase
                                     Efficiency and Effectiveness
                                     for the DOC and Friends
                                     and Families




GTL Confidential and Proprietary                 20
Thank You

(Questions?)

More Related Content

More from M2SYS Technology

The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric Solutions
M2SYS Technology
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
M2SYS Technology
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces Costs
M2SYS Technology
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in Healthcare
M2SYS Technology
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
M2SYS Technology
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
M2SYS Technology
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
M2SYS Technology
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
M2SYS Technology
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business
M2SYS Technology
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
M2SYS Technology
 

More from M2SYS Technology (10)

The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric Solutions
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces Costs
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in Healthcare
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
 

Recently uploaded

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

Identifying Prisoners and Visitors using Localized AFIS

  • 1. The Winter 2012 Biometrics Summit Miami, FL February 27 – March 1, 2012 Identifying Prisoners And Visitors Using Localized AFIS Mizan Rahman Jim Rokosky Founder & CEO Sr. VP, DSI Operations M2SYS Technology Global Tel*Link Corporation
  • 3. M2SYS Overview • Biometric R&D company focus on technology innovation for rapid biometric adoption • Winner of 2007 Frost & Sullivan Biometrics Technology Innovation of the Year Award • Winner of 2011 Frost & Sullivan New Product Innovation Award • Primary Markets Served: Public Safety – Law Enforcement, Electoral, Healthcare, Banking, Education, POS, Childcare, Transportation, Workforce Management, Membership Management, Application Security • Tens of Thousands of Customer Deployments in 100 Countries Worldwide
  • 4. GTL Overview – Nationwide Presence  Leading provider of telecom and technology products and services in the corrections industry  Provides network based collect and prepaid call processing and digital recording infrastructure platforms in conjunction with monitored telecommunications systems  Serves ~ 1,900 facilities and over 1.1 million inmates in 47 states and over 800 counties  Holds the State Department of Corrections contract in 33 of 50 states including 14 of 20 largest GTL DOC Customer GTL with no DOC GTL Confidential and Proprietary 4
  • 5.
  • 6. M2SYS & GTL - Synergy Visitor Management Biometrics Inmate Management • M2SYS focuses on biometrics and enabling software providers to rapidly integrate biometric functionalities • GTL focuses on providing end-to-end solutions for prisons
  • 7. What brings us together ?
  • 8. Statistics from DOJ • Of the 272,111 persons released from prisons in 15 States in 1994, an estimated 67.5% were rearrested for a felony or serious misdemeanor within 3 years, 46.9% were reconvicted, and 25.4% resentenced to prison for a new crime. • The 272,111 offenders discharged in 1994 accounted for nearly 4,877,000 arrest charges over their recorded careers. • Sex offenders were less likely than non-sex offenders to be rearrested for any offense –– 43% of sex offenders versus 68% of non-sex offenders.
  • 9. The Magic Number ~ 40% Almost 40% of the prison population are repeat offenders. Some of our clients came up with a perfect euphemism for these offenders – “The frequent flyers” • The same criminals are coming back to the jails over and over again • The same visitors are also coming back over and over again
  • 10. Releasing the wrong inmate Releasing officer fails Swap badge with Pretend to be to prevent because someone else being someone else with of ethnic diversity or released false badge sophisticated execution
  • 11.
  • 12.
  • 13.
  • 14. Need for localized AFIS 1 • Prompt identification of returning offenders 2 • Release the right inmate not his friend 3 • Ensure security & prompt visitor processing
  • 15. What drives the successful implementation? • Fully integrated solutions • Merge both companies Integrated Usability expertise to understand end user culture and deliver exactly what is needed not Versatility Training what we want to sell
  • 16. Challenges • Age of users • Intuitive design • Working class • User feedback • Footprint Demography Ergonomics Weather Cost • Cold • Biometric module • Dry can’t be more • Wet expensive then main JMS system
  • 17. Who is using it? M2SYS & GTL together deployed our integrated solutions in over 100 jails, managing millions of biometric records. Country Project Prominent private correction 70 Jails, centrally connected facility Dekalb County, Atlanta, GA 3,500 beds – largest jail in the South
  • 18. Future… Adoption Collaboration (cloud biometrics) Regional Data Sharing More integration (medication dispensing, move ment tracking)
  • 19. M2SYS’s Strategy Hybrid Biometric Platform™ (HBP) is an enterprise-ready biometric recognition system that supports fingerprint, finger vein, palm vein, and iris biometrics. HBP is “plug-and-play” with any of these biometric modalities, ensuring near 100% read rates for any biometric technology implementation. Features/Benefits: • One integration provides access to an enterprise-ready, Hybrid Biometrics™ system • Immediately utilize fingerprint, finger vein, palm vein, and iris recognition • Unlike four, separate low-level SDKs, Hybrid Biometric Platform™ is pre-built, scalable, easily integrated, and lowers total cost of ownership • Ensure 100% read rates, regardless of environmental, demographic, or other factors that negatively impact some forms of biometrics
  • 20. GTL’s Strategy  Latest Correctional Applications and Consumer Payment Technology  Products/Services that Increase Call Volume and Improve Satisfaction  Tools that Increase Efficiency and Effectiveness of Investigations  Applications that Increase Efficiency and Effectiveness for the DOC and Friends and Families GTL Confidential and Proprietary 20