Offender message delivery system

ABSTRACT

A correctional facility communication system for sending an external message to an offender of a correctional facility is disclosed. The correctional facility communication system includes a messaging system and a correctional facility system coupled together with a wide area network. The messaging system is at a first location and the correctional facility system is at a second location, different from the first location. The messaging system authenticates a sender of the external message, receives the external message in electronic form at the first location, checks the external message against criteria specified by the correctional facility, determine a second location of the offender and a corresponding printer, and sends the external message to the second location for automatic printing with the corresponding printer.

This application is a continuation of U.S. patent application Ser. No.13/938,990 filed Jul. 10, 2013, which is a continuation of U.S. patentapplication Ser. No. 13/479,096 filed May 23, 2012, which is acontinuation of U.S. patent application Ser. No. 12/780,830 filed May14, 2010, which is a continuation of U.S. patent application Ser. No.11/357,869, filed Feb. 16, 2006, which claims the benefit of U.S.Provisional Application No. 60/654,546 filed on Feb. 17, 2005, each ofwhich is hereby incorporated by reference herein in its entirety.

BACKGROUND

This disclosure relates in general to message delivery and, but not byway of limitation, to delivery of messages for incarceration facilities.

Offenders in correctional facilities can send and receive postal servicemail. This mail can take weeks to get through screening that may beperformed at a correctional facility. In some cases, the mail can be ina foreign language, which can further delay screening. Screening mayinclude searching for contraband and reading the content.

Correctional facilities are under constant pressure to reduce costs andperform more efficiently. Delivery and control of mail is laborintensive. Legal papers are controlled to restrict review. Often, thelegal papers have their envelope opened in front of a prisoner to assurethat the legal papers are received without review.

The anthrax terrorist attacks on the postal system in the United Statesdemonstrated how venerable the mail delivery is to this type ofterrorist threat. Correctional facilities are vulnerable to this sort ofthreat and do not lack persons who wish to inflict damage on theseinstitutions. Mail rooms have become the front line for these sorts ofattacks.

Offenders are known to use the mail system to pass improper messages.Despite screening, the mail system often misses coded messages andcontraband. Manual review of letters is labor intensive and subject toerror. For example, the letter may be in a foreign language notunderstood by the reviewer.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is described in conjunction with the appendedfigures:

FIGS. 1A and 1B depict block diagrams of embodiments of a communicationsystem;

FIGS. 2A and 2B depict block diagrams of embodiments of a correctionalfacility system;

FIGS. 3A and 3B depict block diagrams of embodiments of a messagingsystem;

FIG. 4 illustrates a flow diagram of an embodiment of a process forcustomizing the communication system for a particular correctionalfacility system;

FIG. 5 illustrates a flow diagram of an embodiment of a process forsending a message to an offender; and

FIG. 6 illustrates a flow diagram of an embodiment of a process forsending a message from an offender.

In the appended figures, similar components and/or features may have thesame reference label. Further, various components of the same type maybe distinguished by following the reference label by a dash and a secondlabel that distinguishes among the similar components. If only the firstreference label is used in the specification, the description isapplicable to any one of the similar components having the same firstreference label irrespective of the second reference label.

DETAILED DESCRIPTION

The ensuing description provides preferred exemplary embodiment(s) only,and is not intended to limit the scope, applicability or configurationof the disclosure. Rather, the ensuing description of the preferredexemplary embodiment(s) will provide those skilled in the art with anenabling description for implementing a preferred exemplary embodiment.It being understood that various changes may be made in the function andarrangement of elements without departing from the spirit and scope asset forth in the appended claims.

Specific details are given in the following description to provide athorough understanding of the embodiments. However, it will beunderstood by one of ordinary skill in the art that the embodiments maybe practiced without these specific details. For example, circuits maybe shown in block diagrams in order not to obscure the embodiments inunnecessary detail. In other instances, well-known circuits, processes,algorithms, structures, and techniques may be shown without unnecessarydetail in order to avoid obscuring the embodiments.

Also, it is noted that the embodiments may be described as a processwhich is depicted as a flowchart, a flow diagram, a data flow diagram, astructure diagram, or a block diagram. Although a flowchart may describethe operations as a sequential process, many of the operations can beperformed in parallel or concurrently. In addition, the order of theoperations may be re-arranged. A process is terminated when itsoperations are completed, but could have additional steps or blocks notincluded in the figure. A process may correspond to a method, afunction, a procedure, a subroutine, a subprogram, etc. When a processcorresponds to a function, its termination corresponds to a return ofthe function to the calling function or the main function.

Moreover, as disclosed herein, the term “storage medium” may representone or more devices for storing data, including read only memory (ROM),random access memory (RAM), magnetic RAM, core memory, magnetic diskstorage mediums, optical storage mediums, flash memory devices and/orother machine readable mediums for storing information. The term“machine-readable medium” includes, but is not limited to portable orfixed storage devices, optical storage devices, wireless channels andvarious other mediums capable of storing, containing or carryinginstruction(s) and/or data.

Furthermore, embodiments may be implemented by hardware, software,firmware, middleware, microcode, hardware description languages, or anycombination thereof. When implemented in software, firmware, middlewareor microcode, the program code or code segments to perform the necessarytasks may be stored in a machine readable medium such as storage medium.A processor(s) may perform the necessary tasks. A code segment ormachine-executable instructions may represent a procedure, a function, asubprogram, a program, a routine, a subroutine, a module, a softwarepackage, a class, or any combination of instructions, data structures,or program statements. A code segment may be coupled to another codesegment or a hardware circuit by passing and/or receiving information,data, arguments, parameters, or memory contents. Information, arguments,parameters, data, etc. may be passed, forwarded, or transmitted via anysuitable means including memory sharing, message passing, token passing,network transmission, etc.

Referring first to FIG. 1A, a block diagram of an embodiment of acommunication system 100-1 is shown. The communication system 100 allowssending and receiving messages between an offender within thecorrectional facility system 108 and a member of the public interactingwith the messaging system 104. A home computer 116 or kiosk 112 can beused by the member of the public to interact with the messaging system104. There could be a single correctional facility system 108 ormultiple correctional facility systems 108 that are accessible from themessaging system 104. The correctional facility systems 108 could begroups of correctional facilities arranged by city, county, state,country, private company, or other commonality. The term correctionalfacility is meant to include any institution housing offenders,offenders and/or prisoners, for example, a jail, a federal or statedetention center or a military prison.

The messaging system 104 has an application or web interface that isaccessible from a wide area network (WAN) 120. Any home computer 116,kiosk 112, personal digital assistant (PDA), mobile phone, web pad,laptop or other computing device can interact with the messaging system104 in various embodiments. The kiosks 112 could be located at acorrectional facility system 108, library, post office, judicialbuilding, business, law firm, or other location.

Various embodiments have different ways to enter messages. In oneembodiment, a voice recognition system accessible from a phone line, forexample, can be used to enter a message for the messaging system 104.The home computer or kiosk 112, 116 includes a keyboard, mouse and/orvoice interface to allow entering messages. Some embodiments of the homecomputer or kiosk 116, 112 could include a scanner to enter typed orhandwritten messages. Photographs could be sent by loading them fromsome sort of machine readable medium or scanning them.

In this embodiment, the messaging system 104 is coupled to thecorrectional facility system by way of the WAN 120. The WAN couldinclude the Internet, private connections and/or virtual privatenetworks to facilitate this communication. This embodiment encrypts thecommunication between the messaging system 104 and the correctionalfacility system 108 over a public network such as the Internet. Althoughvarious embodiments show certain blocks being implemented in themessaging system 104 or correctional facility system 108, those skilledin the art appreciate that those blocks could be shuffled around thecommunication system 100.

With reference to FIG. 1B, a block diagram of another embodiment of acommunication system 100-2 is shown. In this embodiment, only the homecomputers 116 use the WAN 120 to communicate with the messaging system104. The kiosks 112, messaging system 104 and correctional facilitysystem(s) 108 use direct connections. For example, the kiosk might havean encrypted link or circuit switched connection to the messaging system104. Any topology of circuit or packet switched or public or privatenetworks could be used to facilitate data transfer in the communicationsystem 100.

Referring next to FIG. 2A, a block diagram of an embodiment of thecorrectional facility system 108-1 is shown. A correctional facilitycomputer 204 generally controls the correctional facility system 108.The correctional facility computer could be a number of computersdistributed throughout the correctional facility system 108 thatcommunicate with a network. Kiosk 112 may be made available to offendersin some embodiments to allow sending and/or reading messages. Someembodiments do not allow reading messages at the kiosks 112, which areprinted by a message printer 208 for hand delivery to the offender.

An approved person log 232 is maintained at the correctional facilitysystem 108. Approved persons could include relatives, those approved forvisitation, legal representatives, law enforcement, etc. Approvedpersons that can visit the offender could have a biometric stored in theapproved person log 232. A biometric scanner 212 at a correctionalfacility could be used to gather the biometric. Other embodiments coulduse public biometric information such as drivers license fingerprints orphotos. Biometric scanners at the kiosks 112 and home computers 116 canbe verified against those stored in the approved person log 232 toauthenticate identity for visitation or messaging purposes. In somecases, an approved person may have a background check to allowauthorized contact with the offender.

An external interface 220 is used to communicate with the correctionalfacility system 108. This external interface 220 could be for a singlecorrectional facility or a system of correctional facilities.Communication with the external interface 220 is protected from hackingby using cryptography or physical security in various embodiments. Inthis embodiment, the external interface 220 uses a virtual privatenetwork to connect through the Internet to the messaging system 104.Another embodiment uses a circuit switched network in the externalinterface 220 to provide physical security.

Message printers 208 are distributed through the correctional facilitysystem 108 to allow efficient delivery of messages to offenders. Themessage printers can print messages with bar code, watermark, RFID, orother tracking embedded to allow tracking messages. Additionally,location and recipient information for the offender could be printed toease delivery. The tracking information, location and recipientinformation could be printed on the back of sheets or in margins. Forlegal correspondence, the message printers could print messages andautomatically insert them into an envelope to insure privacy of thatcommunication. At delivery, the legal document can be opened in thepresence of the offender if that is the correctional facility policy.

In some embodiments, the message printer 208 or special photo printerscan print a photograph included with the message or sent separately.Various sized photos may be allowed for different price points. Softwareat the messaging system 104 could be used to screen photos forappropriateness.

An messaging interface 244 to an operator could allow confirming theoffender is located near the printer and to screen any flagged messages.Messages are automatically screened at the messaging system 104 asdescribed below, but could be manually screened when flagged or whenwarranted for an offender or group of offenders using the messaginginterface 244. Messages screened out during this process would not beprinted for delivery to the offender. The messaging interface 244 isalso used to configure the messaging system according to the policiesfor the correctional facility, group of offenders and/or a particularoffender. Rules and policies can be entered from pre-configuredtemplates or created from scratch.

In cases where the wrong printer 208 for an offender is initiallychosen, the messaging interface could be used to re-route the message.In one embodiment, all messages are sent to an operator for manualrouting to the appropriate printer 208. Some embodiments determinerouting to the printer 208 at the messaging system 104 or thecorrectional facility system 108 in any number of automatic and/ormanual ways.

An internal money account 236 may be used to fund the message deliverycosts for each prisoner in one embodiment. The internal money account236 could be the same account used to fund other purchases by theoffender. In other embodiments, an external money account is maintainedby the messaging system 104. The internal money account 236 could beused to fund the external money account or it could be funded in otherways (e.g., credit/debit card, wire transfer, cash deposit atcorrectional facility, electronic check, mailed check).

An offender information, location and classification database (“offenderdatabase”) 228 is used to track various information related to theoffender. The current location of the offender (i.e., correctionalfacility, cell block, cell identifier, floor, bed, etc.) is recorded inthe offender database 228. The classification of the offender is alsostored such that groupings of offenders with similar classifications canbe determined. Any investigatory flagging can also be stored such thatmessages are viewed with greater scrutiny. Persons capable ofcommunicating with the offender are also stored such that messages canbe limited to those persons who have been also approved. Biometrics usedin authenticating the offender when using the kiosk 112 is also storedin the offender database 228.

With reference to FIG. 2B, a block diagram of another embodiment of thecorrectional facility system 108-2 is shown. This embodiment of thecorrectional facility system 108-2 does not have a messaging interface244, which could allow configuration at the messaging system. Theoperator at the printer could manually review the printed messagesand/or photos. Any flagged messages and/or photos could be held at themessaging system for review there before putting them through to themessage printer 208.

This embodiment doesn't have a persistent connection between theexternal interface 220 and the remainder of the correctional facilitysystem 108-2. Messages are received by the external interface 220 foroutput by the message printer 208 without information from the remainderof the correctional facility system 108-2. Intermittently, the externalinterface 220 may be used to allow configuring or reconciling data withthe messaging system 104. For example, a disk may be used to transportinformation that is sent by the external interface 220 to the messagingsystem 104. The transported information could be used by the messagingsystem to properly screen, test and route messages, for example.

Referring next to FIG. 3A, a block diagram of an embodiment of amessaging system 104-1 is shown. Some blocks are similar to those ofprior figures. Specifically, the external interface 220 allowscommunication with correctional facility systems 108 and users, themessage printer 208 allows printing of messages and pictures sent fromoffenders, the offender database 228 gathering of offender informationfrom various correctional facilities, and the approved person log 232that lists who can use the messaging system 104 for specified offenders.The messaging system 104 generally serves as the interface to themessage function under the control of the messaging computer(s) 304.Additionally, screening, translation, data mining, setup, and otherfunctions are performed or controlled by the messaging computer 304,which may include a number of computers and/or systems. Messages from anoffender could be printed at the messaging system 104 for mail orcourier delivery to an approved person or any mail recipient.

Messages for sending or reading are stored in the message database 308.According to policies for the group the offender belongs to or to uniqueflagging, messages may be archived for some amount of time. Once theoffender is released or a period of time expires, the messages could bepurged. In certain cases, the periodic purging could be stayed if thereis an associated investigation or some other interest. In someembodiments, the message database may be duplicative of a number ofdatabases at the correctional facilities that could also store messages.

A message scanner 348 allows digitizing messages or photos received inphysical form. Some correctional facility systems 108 could require thatall mail be routed through the messaging system 104 to avoidtransporting contaminants and contraband into the correctionalfacilities using the mail system. Legal documents could be scanned atthe law offices and uploaded to the messaging system 104 electronicallyfor private delivery. These documents could be stored in the messagedatabase under an electronic seal or with encryption to protect theattorney-client privilege.

As mentioned above, an external money account 336 could log accountbalances. The account balance could be used to pay for the services ofthe messaging system 104 and/or to transfer funds to the internal moneyaccount 236. The offender and/or approved person could fund the externalmoney account 336. Users of the messaging system 104 could be charged ona per message basis or according to a subscription. For example, for $10a month a particular offender could receive up to 100 sheets of messagesfrom any number of approved persons. The revenue collected to theservice could be shared on a per sheet, per message, and/or profit sharebasis with the cooperating correctional facilities. For example, if itwere $1 a sheet to print and deliver a picture, the messaging systemcould receive 80% with the remainder to the correctional facility whoprinted the photo.

All the messages in the message database 308 could be potentiallyinvestigated. A data mining block 312 would allow making these queriesand finding patterns among messages in a manner done by data miningsoftware. For example, when a new code word were uncovered, the datamining block 312 could query to see all the other messages from relatedindividuals included that code word in an unusual way. Law enforcementofficials could have access to the data mining tool 312 to perform theseinvestigations. Users of the messaging system 104 could waive theirright to privacy in the terms of use such that a warrant may not even berequired.

The messaging system 104 could be capable of use in several differentlanguages. When a particular offender or approved person chooses anon-English language, all messages are flagged for translation. Even ifEnglish menuing is chosen, the users are asked to specify the languageof the message. Automatically, the message is translated by the messagetranslator 316 to aid in automatic and manual review of the message. Themessage may be stored in both languages in the message database 308.Some embodiments, use the message translator 316 to allow communicationbetween parties who only speak different languages. One party canspecify the delivery language to the other party.

A message interrogator 320 performs several functions to screen and/orflag messages. A keyword database 324 could search for suspect termsthat are globally specified or could only search messages from certainparties or groups for certain words. For example, any mention of“murder” could be flagged, but a code word “redlight” could only beflagged by the gang members known to use that term could be flagged. Themessage interrogator 320 also searches for unintelligible or oddcommunications. An unintelligible message could signal code is beingused or that the translation was not performed correctly. Oddcommunications could be use of obscure terms in strange ways. Forexample, repeated use of a term such as “redlight” could point to apotential code word.

Any flagging or screening is noted in the message database and forwardedto the correctional facility system 108 for possible additionalscreening. Different screening policies could exist for differentoffenders or groups of offenders. For example, screening for gang codewords in a minimum security half way house might not be performed unlessan individual is suspected as belonging to a gang. The messagingcomputer 304 passes messages through the external interface 220 incommunicating with the appropriate correctional facility system 108.

With reference to FIG. 3B, a block diagram of another embodiment of amessaging system 104-2 is shown. This embodiment does not include amessage scanner 348 or message printer 208 to allow mail conversion forelectronic messaging. This embodiment includes separate user interfaces220-1 and correctional facility interfaces 220-2. The correctionalfacility interface 220-2 may be isolated from other parts of themessaging system 104 using physical security and/or firewalling. Themessaging computer 304 be a secure processor or use other techniques toprevent hacking through the user interface 220-1 to get at confidentialinformation or disable the messaging system 104.

The data structure of this messaging system 104-2 is different fromother embodiments. The offender database 228 and approved person log 232are not maintained in the messaging system 104. This information couldbe queried on demand from the relevant correctional facility system 108rather than storing it locally. This embodiment includes a separatemessage archive 340 to keep those messages that are likely to be usedfor data mining in the future. The message archive 340 could be aback-up system that uses removable media, such as tapes or opticaldisks. If needed, these archived messages can be maintained for years.

This embodiment also includes a correctional facility customizationsdatabase 344. Each correctional facility system 108 can customizemessage policies for groups of offenders, individual offenders and/orsubsets of groups of offenders. Further, translation and interrogationalgorithms can be customized according to preferences by the variouscorrectional facility systems 108. Revenue agreement terms can be placedin the customizations database 344 to allow automatic division ofrevenue.

Referring next to FIG. 4, a flow diagram of an embodiment of a process400 for customizing the communication system 100 for a particularcorrectional facility system 108 is illustrated. These customizationscould be entered using the messaging interface 144 and stored in thecorrectional facility customizations database 344. The depicted portionof the process begins in block 404 where the operator logs into themessaging interface 244. A biometric could be used here for increasedsecurity. Some embodiments allow remote login, but others require thephysical security of performing the customizations at the messagingsystem 104. Offender groups are configured in block 408. All offendersare categorized one or more of these groupings in the offender database228. The groups could be by cell block, crime, category of crime, gangaffiliation, approved person affiliation, etc.

In block 416, offender records are tied to the various groups in theoffender database 228. Exceptions to various groupings can be specifiedindividually or in a subset in block 420. For example, all undercoveragents that are posing as gang members could be excluded from thepolicies specified for that group. Keywords can be specified globally orby group in block 424. Other configurations, could be performed althoughnot shown in the figure.

With reference to FIG. 5, a flow diagram of an embodiment of a process500 for sending a message to an offender is shown. The depicted portionof the process begins in block 504 where the user or legalrepresentative is authenticated. This could include matching biometricsand checking the approved person log 232. First time users and legalrepresentative might have to set up an account, get an authenticbiometric scan and/or have a background check performed before use ofthe messaging system 104 is allowed. Where authorization passes,processing continues to block 508 where the language of the web siteand/or message is specified.

The message is written, uploaded or scanned into the messaging system104 in block 512. This message could be a photo or include a photo inaddition to text. Where a legal representative wants the message toremain confidential, this can be specified. In block 516, the offenderrecipient is identified. A check is made to confirm that the approvedperson is authorized to exchange messages with the particular offender.If necessary, the message is translated in block 520. Both thetranslated and un-translated message are stored in the message database308.

Policies for groups, individuals and subsets are checked in block 524 todetermine if authorized. For example, a particular correctional facilitymight be in lock down at the time the message is entered such that itwould be stored for possible later delivery. Some embodiments couldlimit the number or length of the messages. Authorization may alsoinclude checking for sufficient credit or money in the money account(s)236, 336. In block 528, the message is interrogated for intelligibilityand keywords. Other checks could be performed in this block to findpatterns that should be flagged.

In block 532, a determination is made if there were any problems in thepreceding blocks. Where there are problems, an appropriate error messageis generated before possibly logging the error and/or message in block536. The process could be initiated again or resumed once the problem isremedied. Where there is no problem processing goes from block 532 toblock 540 to determine the location of the offender. This location isstored in the offender database 228 that might be local to the messagingsystem 104 or in the correctional facility system 108.

In block 544, the message is sent from the messaging system 104 to theproper correctional facility system 108. This may be automatically donewhere the offender location is discernable. Other embodiments may sendall messages to a particular location for manual direction to theappropriate part of the correctional facility system. Yet otherembodiments may deliver most automatically, but some are still routedmanually when the location of the offender cannot be discerned. Flagged,blocked and/or questionable messages can also be reviewed manually inthis block to further investigate if delivery is appropriate.

The message and/or photos are printed in block 548. For legal documentsproperly indicated, the printing can be done under seal to preventviewing by correctional facility personnel under normal circumstances.Bar coding, water marking, expiration dates, delivery instructions, etc.can be included according to correctional facility customizations 344.In block 552, the message and/or pictures are delivered to the offenderrecipient. In this embodiment, a handheld scanner can scan a bar codeassociate with the printer and a bar code on the document to confirmdelivery of the message. This delivery confirmation could be passed backto the messaging system 104 to provide an audit trail.

Referring next to FIG. 6, a flow diagram of an embodiment of a process600 for sending a message from an offender is shown. This process issimilar to that performed when sending a message to the offender. Thebelow description accentuates the differences from the prior describedprocess. In block 604, the authentication is performed on the offenderusing biometrics, but could also include reading a correctional facilityidentity card. Blocks 508, 512, 516, and 520 are performed as before. Inblock 624, a determination is made of whether the offender and recipientare authorized. The recipient is registered with the messaging systemand authorized. In this embodiment, the recipient can register an e-mailaddress or physical address without giving that information to theoffender. The messaging system 104 can redirect the message to theappropriate address without disclosing that information to the offender.

Next, blocks 528, 532, and 536 are performed as before. Where there areno problems in block 532, processing continues to block 648 wheremessages for mailing are printed, which can be done under seal if theoffender specifies that the message is legally protected. The messagecould still be stored in the message database 308 should a searchwarrant be issued to review the messages tagged as legal documents. Inblock 652, the message is delivered electronically or physically. Aparticular recipient can view the messages by logging into the messagesystem 104 and/or by specifying an e-mail address to receive anymessages.

A number of variations and modifications of the disclosed embodimentscan also be used. For example, the above embodiments describe deliveringdocuments to offenders, but the messages could be similarly sent to orfrom correctional facility administration. Some embodiments discusshaving the messages go between approved persons and approved visitors.Other embodiments could allow anyone to message offenders in much thesame way that mail is allowed today. The ability for offenders to sendmessages to anyone may be curtailed or not in various embodiments. Forexample, messages that are sent by offenders for printing and mailingcould be unrestricted, but e-mail messages could only be to approvedpersons.

The techniques described herein may be implemented by various means. Forexample, these techniques may be implemented in hardware, software, or acombination thereof. For a hardware implementation, the processing unitsmay be implemented within one or more application specific integratedcircuits (ASICs), digital signal processors (DSPs), digital signalprocessing devices (DSPDs), programmable logic devices (PLDs), fieldprogrammable gate arrays (FPGAs), processors, controllers,micro-controllers, microprocessors, other electronic units designed toperform the functions described herein, or a combination thereof.

For a software implementation, the techniques, processes and functionsdescribed herein may be implemented with modules (e.g., procedures,functions, and so on) that perform the functions described herein. Thesoftware codes may be stored in memory units and executed by processors.The memory unit may be implemented within the processor or external tothe processor, in which case it can be communicatively coupled to theprocessor via various means as is known in the art.

While the principles of the disclosure have been described above inconnection with specific apparatuses and methods, it is to be clearlyunderstood that this description is made only by way of example and notas limitation on the scope of the disclosure.

What is claimed is:
 1. A system for managing and provisioning content toan inmate housed in a correctional facility, the system comprising: oneor more network interfaces configured to facilitate network access for acorrectional facility system, the one or more network interfaces toconnect to one or more portable computing devices associated withinmates, wherein the correctional facility system corresponds to one ormore correctional facilities; one or more user interfaces to facilitateaccess to information regarding content from a content repository thatis network-accessible; one or more processors coupled to the one or morenetwork interfaces, to one or more repositories that retain informationabout the inmates, and to the one or more user interfaces, the one ormore processors to execute instructions to: enable authorized access,via the one or more user interfaces, to select information regarding oneor more content items of the content repository based at least in parton processing authentication information corresponding to personsapproved for access; process a request for access received via the oneor more user interfaces; responsive to the request, retrieve from anoffender database information regarding an identity of a first inmatehoused in one of the one or more correctional facilities, wherein theoffender database stores inmate information particular to the firstinmate and comprising the information regarding the identity of thefirst inmate in association with an offender classification of the firstinmate and/or a location of the first inmate; based at least in part onapplying one or more predetermined rules to the inmate informationparticular to the first inmate, determine whether the one or morepredetermined rules are violated, wherein the one or more predeterminedrules are specified by the correction facility and regulate contentdistribution to the inmates; facilitate presentation of one or morecontent options and process information regarding a selection of a firstcontent option of the one or more content options, the selectionindicating a first content item of the one or more content items fortransfer to a first portable computing device associated with the firstinmate, the one or more portable computing devices comprising the firstportable computing device; and consequent to a determination that theone or more predetermined rules are not violated based at least in parton the identity of the first inmate, initiate transfer of datacorresponding to at least part of the first content item to facilitateprovisioning of the at least part of the first content item to the firstportable computing device associated with the first inmate.
 2. Thesystem for managing and provisioning the content to the inmate housed inthe correctional facility of claim 1, wherein the one or more contentoptions exposed to the first inmate are a function of the informationregarding the identity of the first inmate.
 3. The system for managingand provisioning the content to the inmate housed in the correctionalfacility of claim 1, wherein the first content item comprises one ormore of a recorded media item, audio content, video content, audiovisualcontent, and/or electronic book content.
 4. The system for managing andprovisioning the content to the inmate housed in the correctionalfacility of claim 1, wherein the first portable computing devicecomprises one or more of a mobile phone, a web pad, a laptop, and/or amedia player.
 5. The system for managing and provisioning the content tothe inmate housed in the correctional facility of claim 1, wherein thecontent repository corresponds to a service provider that is external tocorrectional facility system, and the first content item is downloadedvia an authorized online service.
 6. The system for managing andprovisioning the content to the inmate housed in the correctionalfacility of claim 1, the one or more processors to further executeinstructions to: store the first content item for transfer of the firstcontent item on demand to the first portable computing device associatedwith the first inmate.
 7. The system for managing and provisioning thecontent to the inmate housed in the correctional facility of claim 1,wherein at least one of the one or more repositories retains accountinformation associated with the first inmate, and the one or moreprocessors are to further execute instructions to: process the accountinformation associated with the first inmate, and process transactioninformation related to the selection indicating the first content item.8. The system for managing and provisioning the content to the inmatehoused in the correctional facility of claim 1, wherein the one or morenetwork interfaces effect data transmission via one or more wirelesschannels.
 9. One or more non-transitory, machine-readable media havingmachine-readable instructions thereon which, when executed by one ormore processors, cause the one or more processors to: enable authorizedaccess, via one or more network interfaces and one or more userinterfaces, to select information regarding one or more content items ofa content repository, which is network-accessible, based at least inpart on processing authentication information corresponding to personsapproved for access, the one or more network interfaces to facilitatenetwork access for a correctional facility system and to connect to oneor more portable computing devices associated with inmates, wherein thecorrectional facility system corresponds to one or more correctionalfacilities, and the one or more user interfaces facilitate access toinformation regarding content from the content repository; process arequest for access received via the one or more user interfaces;responsive to the request, retrieve from an offender databaseinformation regarding an identity of a first inmate housed in one of theone or more correctional facilities, wherein the offender databasestores inmate information particular to the first inmate and comprisingthe information regarding the identity of the first inmate inassociation with an offender classification of the first inmate and/or alocation of the first inmate; based at least in part on applying one ormore predetermined rules to the inmate information particular to thefirst inmate, determine whether the one or more predetermined rules areviolated, wherein the one or more predetermined rules are specified bythe correction facility and regulate content distribution to theinmates; facilitate presentation of one or more content options andprocess information regarding a selection of a first content option ofthe one or more content options, the selection indicating a firstcontent item of the one or more content items for transfer to a firstportable computing device associated with the first inmate, the one ormore portable computing devices comprising the first portable computingdevice; and consequent to a determination that the one or morepredetermined rules are not violated based at least in part on theidentity of the first inmate, initiate transfer of data corresponding toat least part of the first content item to facilitate provisioning ofthe at least part of the first content item to the first portablecomputing device associated with the first inmate.
 10. The one or morenon-transitory, machine-readable media of claim 9, wherein the one ormore content options exposed to the first inmate are a function of theinformation regarding the identity of the first inmate.
 11. The one ormore non-transitory, machine-readable media of claim 9, wherein thefirst content item comprises one or more of a recorded media item, audiocontent, video content, audiovisual content, and/or electronic bookcontent.
 12. The one or more non-transitory, machine-readable media ofclaim 9, wherein the first portable computing device comprises one ormore of a mobile phone, a web pad, a laptop, and/or a media player. 13.The one or more non-transitory, machine-readable media of claim 9,wherein the content repository corresponds to a service provider that isexternal to correctional facility system, and the first content item isdownloaded via an authorized online service.
 14. The one or morenon-transitory, machine-readable media of claim 9, the one or moreprocessors to further execute instructions to: store the first contentitem for transfer of the first content item on demand to the firstportable computing device associated with the first inmate.
 15. The oneor more non-transitory, machine-readable media of claim 9, wherein theone or more processors are coupled to one or more repositories thatretain information about the inmates, and at least one of the one ormore repositories retains account information associated with the firstinmate, and the one or more processors are to further executeinstructions to: process the account information associated with thefirst inmate, and process transaction information related to theselection indicating the first content item.
 16. The one or morenon-transitory, machine-readable media of claim 9, wherein the one ormore network interfaces effect data transmission via one or morewireless channels.
 17. A method for managing and provisioning content toan inmate housed in a correctional facility, the method comprising:enabling authorized access, via one or more network interfaces and oneor more user interfaces, to select information regarding one or morecontent items of a content repository, which is network-accessible,based at least in part on processing authentication informationcorresponding to persons approved for access, the one or more networkinterfaces to facilitate network access for a correctional facilitysystem and to connect to one or more portable computing devicesassociated with inmates, wherein the correctional facility systemcorresponds to one or more correctional facilities, and the one or moreuser interfaces facilitate access to information regarding content fromthe content repository; processing a request for access received via theone or more user interfaces; responsive to the request, retrieving froman offender database information regarding an identity of a first inmatehoused in one of the one or more correctional facilities, wherein theoffender database stores inmate information particular to the firstinmate and comprising the information regarding the identity of thefirst inmate in association with an offender classification of the firstinmate and/or a location of the first inmate; based at least in part onapplying one or more predetermined rules to the inmate informationparticular to the first inmate, determining whether the one or morepredetermined rules are violated, wherein the one or more predeterminedrules are specified by the correction facility and regulate contentdistribution to the inmates; facilitating presentation of one or morecontent options and process information regarding a selection of a firstcontent option of the one or more content options, the selectionindicating a first content item of the one or more content items fortransfer to a first portable computing device associated with the firstinmate, the one or more portable computing devices comprising the firstportable computing device; and consequent to a determination that theone or more predetermined rules are not violated based at least in parton the identity of the first inmate, initiating transfer of datacorresponding to at least part of the first content item to facilitateprovisioning of the at least part of the first content item to the firstportable computing device associated with the first inmate.
 18. Themethod of claim 17, wherein the one or more content options exposed tothe first inmate are a function of the information regarding theidentity of the first inmate.
 19. The method of claim 17, wherein thefirst content item comprises one or more of a recorded media item, audiocontent, video content, audiovisual content, and/or electronic bookcontent.
 20. The method of claim 17, wherein the first portablecomputing device comprises one or more of a mobile phone, a web pad, alaptop, and/or a media player.