Offender message delivery system

ABSTRACT

A correctional facility communication system for sending an external message to an offender of a correctional facility is disclosed. The correctional facility communication system includes a messaging system and a correctional facility system coupled together with a wide area network. The messaging system is at a first location and the correctional facility system is at a second location, different from the first location. The messaging system authenticates a sender of the external message, receives the external message in electronic form at the first location, checks the external message against criteria specified by the correctional facility, determine a second location of the offender and a corresponding printer, and sends the external message to the second location for automatic printing with the corresponding printer.

This application is a continuation of U.S. patent application No.13/479,096 filed May 23, 2012, which is a continuation of U.S. patentapplication No. 12/780,830 filed May 14, 2010, which is a continuationof U.S. patent application No. 11/357,869, filed February 16, 2006,which claims the benefit of U.S. Provisional Application No. 60/654,546filed on Feb. 17, 2005, each of which is hereby incorporated byreference herein in its entirety.

BACKGROUND

This disclosure relates in general to message delivery and, but not byway of limitation, to delivery of messages for incarceration facilities.

Offenders in correctional facilities can send and receive postal servicemail. This mail can take weeks to get through screening that may beperformed at a correctional facility. In some cases, the mail can be ina foreign language, which can further delay screening. Screening mayinclude searching for contraband and reading the content.

Correctional facilities are under constant pressure to reduce costs andperform more efficiently. Delivery and control of mail is laborintensive. Legal papers are controlled to restrict review. Often, thelegal papers have their envelope opened in front of a prisoner to assurethat the legal papers are received without review.

The anthrax terrorist attacks on the postal system in the United Statesdemonstrated how venerable the mail delivery is to this type ofterrorist threat. Correctional facilities are vulnerable to this sort ofthreat and do not lack persons who wish to inflict damage on theseinstitutions. Mail rooms have become the front line for these sorts ofattacks.

Offenders are known to use the mail system to pass improper messages.Despite screening, the mail system often misses coded messages andcontraband. Manual review of letters is labor intensive and subject toerror. For example, the letter may be in a foreign language notunderstood by the reviewer.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is described in conjunction with the appendedfigures:

FIGS. 1A and 1B depict block diagrams of embodiments of a communicationsystem;

FIGS. 2A and 2B depict block diagrams of embodiments of a correctionalfacility system;

FIGS. 3A and 3B depict block diagrams of embodiments of a messagingsystem;

FIG. 4 illustrates a flow diagram of an embodiment of a process forcustomizing the communication system for a particular correctionalfacility system;

FIG. 5 illustrates a flow diagram of an embodiment of a process forsending a message to an offender; and

FIG. 6 illustrates a flow diagram of an embodiment of a process forsending a message from an offender.

In the appended figures, similar components and/or features may have thesame reference label. Further, various components of the same type maybe distinguished by following the reference label by a dash and a secondlabel that distinguishes among the similar components. If only the firstreference label is used in the specification, the description isapplicable to any one of the similar components having the same firstreference label irrespective of the second reference label.

DETAILED DESCRIPTION

The ensuing description provides preferred exemplary embodiment(s) only,and is not intended to limit the scope, applicability or configurationof the disclosure. Rather, the ensuing description of the preferredexemplary embodiment(s) will provide those skilled in the art with anenabling description for implementing a preferred exemplary embodiment.It being understood that various changes may be made in the function andarrangement of elements without departing from the spirit and scope asset forth in the appended claims.

Specific details are given in the following description to provide athorough understanding of the embodiments. However, it will beunderstood by one of ordinary skill in the art that the embodiments maybe practiced without these specific details. For example, circuits maybe shown in block diagrams in order not to obscure the embodiments inunnecessary detail. In other instances, well-known circuits, processes,algorithms, structures, and techniques may be shown without unnecessarydetail in order to avoid obscuring the embodiments.

Also, it is noted that the embodiments may be described as a processwhich is depicted as a flowchart, a flow diagram, a data flow diagram, astructure diagram, or a block diagram. Although a flowchart may describethe operations as a sequential process, many of the operations can beperformed in parallel or concurrently. In addition, the order of theoperations may be re-arranged. A process is terminated when itsoperations are completed, but could have additional steps or blocks notincluded in the figure. A process may correspond to a method, afunction, a procedure, a subroutine, a subprogram, etc. When a processcorresponds to a function, its termination corresponds to a return ofthe function to the calling function or the main function.

Moreover, as disclosed herein, the term “storage medium” may representone or more devices for storing data, including read only memory (ROM),random access memory (RAM), magnetic RAM, core memory, magnetic diskstorage mediums, optical storage mediums, flash memory devices and/orother machine readable mediums for storing information. The term“machine-readable medium” includes, but is not limited to portable orfixed storage devices, optical storage devices, wireless channels andvarious other mediums capable of storing, containing or carryinginstruction(s) and/or data.

Furthermore, embodiments may be implemented by hardware, software,firmware, middleware, microcode, hardware description languages, or anycombination thereof. When implemented in software, firmware, middlewareor microcode, the program code or code segments to perform the necessarytasks may be stored in a machine readable medium such as storage medium.A processor(s) may perform the necessary tasks. A code segment ormachine-executable instructions may represent a procedure, a function, asubprogram, a program, a routine, a subroutine, a module, a softwarepackage, a class, or any combination of instructions, data structures,or program statements. A code segment may be coupled to another codesegment or a hardware circuit by passing and/or receiving information,data, arguments, parameters, or memory contents. Information, arguments,parameters, data, etc.

may be passed, forwarded, or transmitted via any suitable meansincluding memory sharing, message passing, token passing, networktransmission, etc.

Referring first to FIG. 1A, a block diagram of an embodiment of acommunication system 100-1 is shown. The communication system 100 allowssending and receiving messages between an offender within thecorrectional facility system 108 and a member of the public interactingwith the messaging system 104. A home computer 116 or kiosk 112 can beused by the member of the public to interact with the messaging system104. There could be a single correctional facility system 108 ormultiple correctional facility systems 108 that are accessible from themessaging system 104. The correctional facility systems 108 could begroups of correctional facilities arranged by city, county, state,country, private company, or other commonality. The term correctionalfacility is meant to include any institution housing offenders,offenders and/or prisoners, for example, a jail, a federal or statedetention center or a military prison.

The messaging system 104 has an application or web interface that isaccessible from a wide area network (WAN) 120. Any home computer 116,kiosk 112, personal digital assistant (PDA), mobile phone, web pad,laptop or other computing device can interact with the messaging system104 in various embodiments. The kiosks 112 could be located at acorrectional facility system 108, library, post office, judicialbuilding, business, law firm, or other location.

Various embodiments have different ways to enter messages. In oneembodiment, a voice recognition system accessible from a phone line, forexample, can be used to enter a message for the messaging system 104.The home computer or kiosk 112, 116 includes a keyboard, mouse and/orvoice interface to allow entering messages. Some embodiments of the homecomputer or kiosk 116, 112 could include a scanner to enter typed orhandwritten messages. Photographs could be sent by loading them fromsome sort of machine readable medium or scanning them.

In this embodiment, the messaging system 104 is coupled to thecorrectional facility system by way of the WAN 120. The WAN couldinclude the Internet, private connections and/or virtual privatenetworks to facilitate this communication. This embodiment encrypts thecommunication between the messaging system 104 and the correctionalfacility system 108 over a public network such as the Internet. Althoughvarious embodiments show certain blocks being implemented in themessaging system 104 or correctional facility system 108, those skilledin the art appreciate that those blocks could be shuffled around thecommunication system 100.

With reference to FIG. 1B, a block diagram of another embodiment of acommunication system 100-2 is shown. In this embodiment, only the homecomputers 116 use the WAN 120 to communicate with the messaging system104. The kiosks 112, messaging system 104 and correctional facilitysystem(s) 108 use direct connections. For example, the kiosk might havean encrypted link or circuit switched connection to the messaging system104. Any topology of circuit or packet switched or public or privatenetworks could be used to facilitate data transfer in the communicationsystem 100.

Referring next to FIG. 2A, a block diagram of an embodiment of thecorrectional facility system 108-1 is shown. A correctional facilitycomputer 204 generally controls the correctional facility system 108.The correctional facility computer could be a number of computersdistributed throughout the correctional facility system 108 thatcommunicate with a network. Kiosk 112 may be made available to offendersin some embodiments to allow sending and/or reading messages. Someembodiments do not allow reading messages at the kiosks 112, which areprinted by a message printer 208 for hand delivery to the offender.

An approved person log 232 is maintained at the correctional facilitysystem 108. Approved persons could include relatives, those approved forvisitation, legal representatives, law enforcement, etc. Approvedpersons that can visit the offender could have a biometric stored in theapproved person log 232. A biometric scanner 212 at a correctionalfacility could be used to gather the biometric. Other embodiments coulduse public biometric information such as drivers license fingerprints orphotos. Biometric scanners at the kiosks 112 and home computers 116 canbe verified against those stored in the approved person log 232 toauthenticate identity for visitation or messaging purposes. In somecases, an approved person may have a background check to allowauthorized contact with the offender.

An external interface 220 is used to communicate with the correctionalfacility system 108. This external interface 220 could be for a singlecorrectional facility or a system of correctional facilities.Communication with the external interface 220 is protected from hackingby using cryptography or physical security in various embodiments. Inthis embodiment, the external interface 220 uses a virtual privatenetwork to connect through the Internet to the messaging system 104.Another embodiment uses a circuit switched network in the externalinterface 220 to provide physical security.

Message printers 208 are distributed through the correctional facilitysystem 108 to allow efficient delivery of messages to offenders. Themessage printers can print messages with bar code, watermark, RFID, orother tracking embedded to allow tracking messages. Additionally,location and recipient information for the offender could be printed toease delivery. The tracking information, location and recipientinformation could be printed on the back of sheets or in margins. Forlegal correspondence, the message printers could print messages andautomatically insert them into an envelope to insure privacy of thatcommunication. At delivery, the legal document can be opened in thepresence of the offender if that is the correctional facility policy.

In some embodiments, the message printer 208 or special photo printerscan print a photograph included with the message or sent separately.Various sized photos may be allowed for different price points. Softwareat the messaging system 104 could be used to screen photos forappropriateness.

An messaging interface 244 to an operator could allow confirming theoffender is located near the printer and to screen any flagged messages.Messages are automatically screened at the messaging system 104 asdescribed below, but could be manually screened when flagged or whenwarranted for an offender or group of offenders using the messaginginterface 244. Messages screened out during this process would not beprinted for delivery to the offender. The messaging interface 244 isalso used to configure the messaging system according to the policiesfor the correctional facility, group of offenders and/or a particularoffender. Rules and policies can be entered from pre-configuredtemplates or created from scratch.

In cases where the wrong printer 208 for an offender is initiallychosen, the messaging interface could be used to re-route the message.In one embodiment, all messages are sent to an operator for manualrouting to the appropriate printer 208. Some embodiments determinerouting to the printer 208 at the messaging system 104 or thecorrectional facility system 108 in any number of automatic and/ormanual ways.

An internal money account 236 may be used to fund the message deliverycosts for each prisoner in one embodiment. The internal money account236 could be the same account used to fund other purchases by theoffender. In other embodiments, an external money account is maintainedby the messaging system 104. The internal money account 236 could beused to fund the external money account or it could be funded in otherways (e.g., credit/debit card, wire transfer, cash deposit atcorrectional facility, electronic check, mailed check).

An offender information, location and classification database (“offenderdatabase”) 228 is used to track various information related to theoffender. The current location of the offender (i.e., correctionalfacility, cell block, cell identifier, floor, bed, etc.) is recorded inthe offender database 228. The classification of the offender is alsostored such that groupings of offenders with similar classifications canbe determined. Any investigatory flagging can also be stored such thatmessages are viewed with greater scrutiny. Persons capable ofcommunicating with the offender are also stored such that messages canbe limited to those persons who have been also approved. Biometrics usedin authenticating the offender when using the kiosk 112 is also storedin the offender database 228.

With reference to FIG. 2B, a block diagram of another embodiment of thecorrectional facility system 108-2 is shown. This embodiment of thecorrectional facility system 108-2 does not have a messaging interface244, which could allow configuration at the messaging system. Theoperator at the printer could manually review the printed messagesand/or photos. Any flagged messages and/or photos could be held at themessaging system for review there before putting them through to themessage printer 208.

This embodiment doesn't have a persistent connection between theexternal interface 220 and the remainder of the correctional facilitysystem 108-2. Messages are received by the external interface 220 foroutput by the message printer 208 without information from the remainderof the correctional facility system 108-2. Intermittently, the externalinterface 220 may be used to allow configuring or reconciling data withthe messaging system 104. For example, a disk may be used to transportinformation that is sent by the external interface 220 to the messagingsystem 104. The transported information could be used by the messagingsystem to properly screen, test and route messages, for example.

Referring next to FIG. 3A, a block diagram of an embodiment of amessaging system 104-1 is shown. Some blocks are similar to those ofprior figures. Specifically, the external interface 220 allowscommunication with correctional facility systems 108 and users, themessage printer 208 allows printing of messages and pictures sent fromoffenders, the offender database 228 gathering of offender informationfrom various correctional facilities, and the approved person log 232that lists who can use the messaging system 104 for specified offenders.The messaging system 104 generally serves as the interface to themessage function under the control of the messaging computer(s) 304.Additionally, screening, translation, data mining, setup, and otherfunctions are performed or controlled by the messaging computer 304,which may include a number of computers and/or systems. Messages from anoffender could be printed at the messaging system 104 for mail orcourier delivery to an approved person or any mail recipient.

Messages for sending or reading are stored in the message database 308.According to policies for the group the offender belongs to or to uniqueflagging, messages may be archived for some amount of time. Once theoffender is released or a period of time expires, the messages could bepurged. In certain cases, the periodic purging could be stayed if thereis an associated investigation or some other interest. In someembodiments, the message database may be duplicative of a number ofdatabases at the correctional facilities that could also store messages.

A message scanner 348 allows digitizing messages or photos received inphysical form. Some correctional facility systems 108 could require thatall mail be routed through the messaging system 104 to avoidtransporting contaminants and contraband into the correctionalfacilities using the mail system. Legal documents could be scanned atthe law offices and uploaded to the messaging system 104 electronicallyfor private delivery. These documents could be stored in the messagedatabase under an electronic seal or with encryption to protect theattorney-client privilege.

As mentioned above, an external money account 336 could log accountbalances. The account balance could be used to pay for the services ofthe messaging system 104 and/or to transfer funds to the internal moneyaccount 236. The offender and/or approved person could fund the externalmoney account 336. Users of the messaging system 104 could be charged ona per message basis or according to a subscription. For example, for $10a month a particular offender could receive up to 100 sheets of messagesfrom any number of approved persons. The revenue collected to theservice could be shared on a per sheet, per message, and/or profit sharebasis with the cooperating correctional facilities. For example, if itwere $1 a sheet to print and deliver a picture, the messaging systemcould receive 80% with the remainder to the correctional facility whoprinted the photo.

All the messages in the message database 308 could be potentiallyinvestigated. A data mining block 312 would allow making these queriesand finding patterns among messages in a manner done by data miningsoftware. For example, when a new code word were uncovered, the datamining block 312 could query to see all the other messages from relatedindividuals included that code word in an unusual way. Law enforcementofficials could have access to the data mining tool 312 to perform theseinvestigations. Users of the messaging system 104 could waive theirright to privacy in the terms of use such that a warrant may not even berequired.

The messaging system 104 could be capable of use in several differentlanguages. When a particular offender or approved person chooses anon-English language, all messages are flagged for translation. Even ifEnglish menuing is chosen, the users are asked to specify the languageof the message. Automatically, the message is translated by the messagetranslator 316 to aid in automatic and manual review of the message. Themessage may be stored in both languages in the message database 308.Some embodiments, use the message translator 316 to allow communicationbetween parties who only speak different languages. One party canspecify the delivery language to the other party.

A message interrogator 320 performs several functions to screen and/orflag messages. A keyword database 324 could search for suspect termsthat are globally specified or could only search messages from certainparties or groups for certain words. For example, any mention of“murder” could be flagged, but a code word “redlight” could only beflagged by the gang members known to use that term could be flagged. Themessage interrogator 320 also searches for unintelligible or oddcommunications. An unintelligible message could signal code is beingused or that the translation was not performed correctly. Oddcommunications could be use of obscure terms in strange ways. Forexample, repeated use of a term such as “redlight” could point to apotential code word.

Any flagging or screening is noted in the message database and forwardedto the correctional facility system 108 for possible additionalscreening. Different screening policies could exist for differentoffenders or groups of offenders. For example, screening for gang codewords in a minimum security half way house might not be performed unlessan individual is suspected as belonging to a gang. The messagingcomputer 304 passes messages through the external interface 220 incommunicating with the appropriate correctional facility system 108.

With reference to FIG. 3B, a block diagram of another embodiment of amessaging system 104-2 is shown. This embodiment does not include amessage scanner 348 or message printer 208 to allow mail conversion forelectronic messaging. This embodiment includes separate user interfaces220-1 and correctional facility interfaces 220-2. The correctionalfacility interface 220-2 may be isolated from other parts of themessaging system 104 using physical security and/or firewalling. Themessaging computer 304 be a secure processor or use other techniques toprevent hacking through the user interface 220-1 to get at confidentialinformation or disable the messaging system 104.

The data structure of this messaging system 104-2 is different fromother embodiments. The offender database 228 and approved person log 232are not maintained in the messaging system 104. This information couldbe queried on demand from the relevant correctional facility system 108rather than storing it locally. This embodiment includes a separatemessage archive 340 to keep those messages that are likely to be usedfor data mining in the future. The message archive 340 could be aback-up system that uses removable media, such as tapes or opticaldisks. If needed, these archived messages can be maintained for years.

This embodiment also includes a correctional facility customizationsdatabase 344. Each correctional facility system 108 can customizemessage policies for groups of offenders, individual offenders and/orsubsets of groups of offenders. Further, translation and interrogationalgorithms can be customized according to preferences by the variouscorrectional facility systems 108. Revenue agreement terms can be placedin the customizations database 344 to allow automatic division ofrevenue.

Referring next to FIG. 4, a flow diagram of an embodiment of a process400 for customizing the communication system 100 for a particularcorrectional facility system 108 is illustrated. These customizationscould be entered using the messaging interface 144 and stored in thecorrectional facility customizations database 344. The depicted portionof the process begins in block 404 where the operator logs into themessaging interface 244. A biometric could be used here for increasedsecurity. Some embodiments allow remote login, but others require thephysical security of performing the customizations at the messagingsystem 104. Offender groups are configured in block 408. All offendersare categorized one or more of these groupings in the offender database228. The groups could be by cell block, crime, category of crime, gangaffiliation, approved person affiliation, etc.

In block 416, offender records are tied to the various groups in theoffender database 228. Exceptions to various groupings can be specifiedindividually or in a subset in block 420. For example, all undercoveragents that are posing as gang members could be excluded from thepolicies specified for that group. Keywords can be specified globally orby group in block 424. Other configurations, could be performed althoughnot shown in the figure.

With reference to FIG. 5, a flow diagram of an embodiment of a process500 for sending a message to an offender is shown. The depicted portionof the process begins in block 504 where the user or legalrepresentative is authenticated. This could include matching biometricsand checking the approved person log 232. First time users and legalrepresentative might have to set up an account, get an authenticbiometric scan and/or have a background check performed before use ofthe messaging system 104 is allowed. Where authorization passes,processing continues to block 508 where the language of the web siteand/or message is specified.

The message is written, uploaded or scanned into the messaging system104 in block 512. This message could be a photo or include a photo inaddition to text. Where a legal representative wants the message toremain confidential, this can be specified. In block 516, the offenderrecipient is identified. A check is made to confirm that the approvedperson is authorized to exchange messages with the particular offender.If necessary, the message is translated in block 520. Both thetranslated and un-translated message are stored in the message database308.

Policies for groups, individuals and subsets are checked in block 524 todetermine if authorized. For example, a particular correctional facilitymight be in lock down at the time the message is entered such that itwould be stored for possible later delivery. Some embodiments couldlimit the number or length of the messages. Authorization may alsoinclude checking for sufficient credit or money in the money account(s)236, 336. In block 528, the message is interrogated for intelligibilityand keywords. Other checks could be performed in this block to findpatterns that should be flagged.

In block 532, a determination is made if there were any problems in thepreceding blocks. Where there are problems, an appropriate error messageis generated before possibly logging the error and/or message in block536. The process could be initiated again or resumed once the problem isremedied. Where there is no problem processing goes from block 532 toblock 540 to determine the location of the offender. This location isstored in the offender database 228 that might be local to the messagingsystem 104 or in the correctional facility system 108.

In block 544, the message is sent from the messaging system 104 to theproper correctional facility system 108. This may be automatically donewhere the offender location is discernable. Other embodiments may sendall messages to a particular location for manual direction to theappropriate part of the correctional facility system. Yet otherembodiments may deliver most automatically, but some are still routedmanually when the location of the offender cannot be discerned. Flagged,blocked and/or questionable messages can also be reviewed manually inthis block to further investigate if delivery is appropriate.

The message and/or photos are printed in block 548. For legal documentsproperly indicated, the printing can be done under seal to preventviewing by correctional facility personnel under normal circumstances.Bar coding, water marking, expiration dates, delivery instructions, etc.can be included according to correctional facility customizations 344.In block 552, the message and/or pictures are delivered to the offenderrecipient. In this embodiment, a handheld scanner can scan a bar codeassociate with the printer and a bar code on the document to confirmdelivery of the message. This delivery confirmation could be passed backto the messaging system 104 to provide an audit trail.

Referring next to FIG. 6, a flow diagram of an embodiment of a process600 for sending a message from an offender is shown. This process issimilar to that performed when sending a message to the offender. Thebelow description accentuates the differences from the prior describedprocess. In block 604, the authentication is performed on the offenderusing biometrics, but could also include reading a correctional facilityidentity card. Blocks 508, 512, 516, and 520 are performed as before. Inblock 624, a determination is made of whether the offender and recipientare authorized. The recipient is registered with the messaging systemand authorized. In this embodiment, the recipient can register an e-mailaddress or physical address without giving that information to theoffender. The messaging system 104 can redirect the message to theappropriate address without disclosing that information to the offender.

Next, blocks 528, 532, and 536 are performed as before. Where there areno problems in block 532, processing continues to block 648 wheremessages for mailing are printed, which can be done under seal if theoffender specifies that the message is legally protected. The messagecould still be stored in the message database 308 should a searchwarrant be issued to review the messages tagged as legal documents. Inblock 652, the message is delivered electronically or physically. Aparticular recipient can view the messages by logging into the messagesystem 104 and/or by specifying an e-mail address to receive anymessages.

A number of variations and modifications of the disclosed embodimentscan also be used. For example, the above embodiments describe deliveringdocuments to offenders, but the messages could be similarly sent to orfrom correctional facility administration. Some embodiments discusshaving the messages go between approved persons and approved visitors.Other embodiments could allow anyone to message offenders in much thesame way that mail is allowed today. The ability for offenders to sendmessages to anyone may be curtailed or not in various embodiments. Forexample, messages that are sent by offenders for printing and mailingcould be unrestricted, but e-mail messages could only be to approvedpersons.

The techniques described herein may be implemented by various means. Forexample, these techniques may be implemented in hardware, software, or acombination thereof For a hardware implementation, the processing unitsmay be implemented within one or more application specific integratedcircuits (ASICs), digital signal processors (DSPs), digital signalprocessing devices (DSPDs), programmable logic devices (PLDs), fieldprogrammable gate arrays (FPGAs), processors, controllers,micro-controllers, microprocessors, other electronic units designed toperform the functions described herein, or a combination thereof

For a software implementation, the techniques, processes and functionsdescribed herein may be implemented with modules (e.g., procedures,functions, and so on) that perform the functions described herein. Thesoftware codes may be stored in memory units and executed by processors.The memory unit may be implemented within the processor or external tothe processor, in which case it can be communicatively coupled to theprocessor via various means as is known in the art.

While the principles of the disclosure have been described above inconnection with specific apparatuses and methods, it is to be clearlyunderstood that this description is made only by way of example and notas limitation on the scope of the disclosure.

1-20. (canceled)
 21. A system for providing an inmate housed in acorrectional facility with access to recorded media, the systemcomprising: one or more network interfaces configured to facilitatenetwork access for a correctional facility system, wherein thecorrectional facility system corresponds to one or more correctionalfacilities; one or more user interfaces to facilitate access toinformation regarding one or more recorded media items from a mediarepository that is network-accessible; one or more processors coupled tothe one or more network interfaces, to one or more repositories thatretain information about inmates housed in the one or more correctionalfacilities, and to the one or more user interfaces, the one or moreprocessors to execute instructions to: enable authorized access, via theone or more user interfaces, to the information regarding one or morerecorded media items from the media repository based at least in part onprocessing authentication information corresponding to persons approvedfor access; process information regarding an identity of a first inmatehoused in one of the one or more correctional facilities; processinformation regarding a selection of the one or more recorded mediaitems for playback by the first inmate; download data corresponding toat least part of the one or more recorded media items consequent to adetermination that one or more predetermined rules are not violatedbased at least in part on the identity of the first inmate, and retainthe data in association with the first inmate; and enable transfer ofthe data to a media player medium to facilitate playback by the firstinmate.
 22. The system for providing an inmate housed in a correctionalfacility with access to recorded media of claim 21, wherein the one ormore processors are to further execute instructions to: apply rulesregulating distribution of one or more electronic copies of the one ormore recorded media items.
 23. The system providing an inmate housed ina correctional facility with access to recorded media of claim 21,wherein at least one of the one or more repositories is to retainaccount information associated with one or more of the inmates.
 24. Thesystem providing an inmate housed in a correctional facility with accessto recorded media of claim 23, wherein the account informationassociated with one or more of the inmates comprises account informationassociated with the first inmate, and the one or more processors are tofurther execute instructions to: process the account informationassociated with the first inmate, and process transaction informationrelated to the download of the data corresponding to the one or morerecorded media items and account information associated with the firstinmate.
 25. The system providing an inmate housed in a correctionalfacility with access to recorded media of claim 21, wherein the one ormore predetermined rules comprises rules governing transactionprocessing for an inmate account.
 26. The system providing an inmatehoused in a correctional facility with access to recorded media of claim21, wherein the retaining the data in association with the first inmatecomprises storing the data for transfer on demand.
 27. The systemproviding an inmate housed in a correctional facility with access torecorded media of claim 21, wherein the one or more user interfaces areprovided in conjunction with one or more kiosks in the one or morecorrectional facilities.
 28. The system providing an inmate housed in acorrectional facility with access to recorded media of claim 21, whereinthe one or more user interfaces comprise a staff interface to allowstaff access to the information regarding one or more recorded mediaitems, and wherein the one or more processors are to further executeinstructions to: generate a notification that the data has been receivedat the one or more correctional facilities.
 29. A non-transitorymachine-readable medium having machine-readable instructions thereonwhich, when executed by one or more computers or other processingdevices, implements a method for providing an inmate housed in acorrectional facility with access to recorded media, causing the one ormore computers or other processing devices to: enable authorized access,via one or more user interfaces, to information regarding one or morerecorded media items from a media repository based at least in part onprocessing authentication information corresponding to persons approvedfor access; process information regarding an identity of a first inmatehoused in one of one or more correctional facilities, wherein theprocessing is based at least in part on information from one or morerepositories about inmates housed in one or more correctionalfacilities; process information regarding a selection of the one or morerecorded media items for playback by the first inmate; download datacorresponding to at least part of the one or more recorded media itemsconsequent to a determination that one or more predetermined rules arenot violated based at least in part on the identity of the first inmate,and retaining the data in association with the first inmate; and enabletransfer of the data to a media player medium to facilitate playback bythe first inmate.
 30. The non-transitory machine-readable medium ofclaim 29, wherein the one or more computers or other processing devicesare to further execute instructions to: apply rules regulatingdistribution of one or more electronic copies of the one or morerecorded media items.
 31. The non-transitory machine-readable medium ofclaim 29, the information retained about inmates comprises accountinformation associated with one or more of the inmates.
 32. Thenon-transitory machine-readable medium of claim 31, wherein the accountinformation associated with one or more of the inmates comprises accountinformation associated with the first inmate, and the one or morecomputers or other processing devices are to further executeinstructions to: process the account information associated with thefirst inmate, and process transaction information related to thedownload of the data corresponding to the one or more recorded mediaitems and account information associated with the first inmate.
 33. Thenon-transitory machine-readable medium of claim 29, wherein the one ormore predetermined rules comprises rules governing transactionprocessing for an inmate account.
 34. The non-transitorymachine-readable medium of claim 29, wherein the retaining the data inassociation with the first inmate comprises storing the data fortransfer on demand.
 35. The non-transitory machine-readable medium ofclaim 29, wherein the one or more user interfaces are provided inconjunction with one or more kiosks in the one or more correctionalfacilities.
 36. The non-transitory machine-readable medium of claim 29,wherein the one or more predetermined rules comprises rules governingtransaction processing for an inmate account.
 37. The non-transitorymachine-readable medium of claim 29, wherein the one or more userinterfaces comprise a staff interface to allow staff access to theinformation regarding one or more recorded media items, and wherein theone or more computers or other processing devices are to further executeinstructions to: generate a notification that the data has been receivedat the one or more correctional facilities.
 38. A method for providingan inmate housed in a correctional facility with access to recordedmedia, the method comprising: enabling authorized access, via one ormore user interfaces that facilitate access to information regarding oneor more recorded media items from a media repository, to the informationregarding one or more recorded media items from the media repositorybased at least in part on processing authentication informationcorresponding to persons approved for access; processing informationregarding an identity of a first inmate housed in one of the one or morecorrectional facilities, wherein the processing is based at least inpart on information from one or more repositories about inmates housedin one or more correctional facilities; processing information regardinga selection of the one or more recorded media items for playback by thefirst inmate; downloading data corresponding to at least part of the oneor more recorded media items consequent to a determination that one ormore predetermined rules are not violated based at least in part on theidentity of the first inmate, and retaining the data in association withthe first inmate; and enabling transfer of the data to a media playermedium to facilitate playback by the first inmate.
 39. The method forproviding an inmate housed in a correctional facility with access torecorded media of claim 38, further comprising: applying rulesregulating distribution of one or more electronic copies of the one ormore recorded media items.
 40. The method for providing an inmate housedin a correctional facility with access to recorded media of claim 38,wherein the retaining the data in association with the first inmatecomprises storing the data for transfer on demand.