Procurement

How to Evaluate Prison RTLS Vendors: A Correctional Facility IT Director's Guide

A disciplined scorecard for selecting a correctional facility tracking system—platform software, integrator services, and the wearable hardware that must survive housing units.

Updated · RTLS Command Network

Prison RTLS vendor evaluation is where ambitious architecture diagrams meet custody reality: officers will not tolerate jittery maps during a count; prosecutors will ask why a timeline export disagrees with video; your CIO will discover that “cloud-ready” meant “public internet relay” unless you interrogated the data plane. This guide is written for correctional facility IT directors, state enterprise architects, and the systems integrators who translate RFP language into installed anchors. It names representative platform ecosystems—Actall (ATLAS), OMNI Corrections, Guard1, Black Creek Integrated Systems Corporation—not to rank them in this article, but to anchor the reader in the competitive set that competes for statewide contracts alongside specialty RTLS pure-plays.

Use it alongside operational primers on prison inmate tracking, deployment methodology in correctional facility RTLS implementation, and hardware commentary in equipment reviews.

Frame the problem before the demo

Every vendor arrives with a polished map. Your job is to define failure modes that matter: missed co-presence in a PREA investigation, inability to prove negative (“not in shower corridor”), or alert storms during recreation releases. Document custody levels, average daily population swings, metal interference zones, and integration targets—JMS, access control, video VMS, and staff duress—before scoring responses. Without that charter, you will compare apples to bolt-cutters.

Evaluation criteria that survive audit

Platform landscape: who does what

Actall markets ATLAS-centric real-time location and duress ecosystems familiar to many U.S. jails—often tightly integrated with staff badges and inmate tags in a single operational map. OMNI Corrections positions solutions across inmate phone, video visitation, and operational automation; RTLS may arrive as part of a broader modernization stack rather than a standalone RF science project. Guard1 historically anchors guard tour and compliance logging—capabilities that sometimes extend into broader physical security integrations where location is one sensor among many. Black Creek ISC supplies automation and control platforms to justice facilities; their value proposition frequently emphasizes operational dashboards tying multiple subsystems together.

None of that replaces your own proof points. Names signal where incumbent relationships may already exist; your scorecard still drives selection.

Bundled vs. best-of-breed hardware

A bundled stack—one vendor supplies software, locators, tags, and professional services—minimizes finger-pointing during warranty events and accelerates initial go-live. It can also lock battery chemistry, RF parameters, and pricing to a sole source just when competitors leapfrog a generation of anchor silicon or fusion algorithms.

Best-of-breed procurement separates the correctional facility tracking system platform (analytics, case management hooks, map UX) from certified components: wearable tags, fixed anchors/gateways, and integration services. Advantages include cost optimization via competitive tag buys, redundancy when a factory pauses shipments, and technology flexibility to swap locators without rewriting business logic—provided APIs remain stable.

Hybrid models win in practice: platform SLA from the integrator, hardware certification lists approved by state security committees, and escrowed firmware signing keys so neither side holds the agency hostage.

RFP template considerations

Strong RTLS RFPs include: a coverage SLO by zone class; a latency budget from tag transmission to operator screen; data residency clauses; penetration test rights; exit ramps (data export formats, open geospatial standards); and pilot acceptance gates that must pass before rollout payments release. Attach a bill of materials template so bidders quote locators per hundred square meters, not “turnkey” black boxes.

Reference questions: wearable tag quality

OEM manufacturers such as REFINE Technology (CO-EYE) routinely answer these questions for integrators who need FCC-certified BLE wearable tags without surrendering the customer relationship. REFINE supplies tags—not turnkey anchor networks; anchor strategy stays with your platform vendor or integrator.

Governance: steering committees that outlast the pilot

Charter representatives from custody operations, medical, PREA compliance, legal discovery, network engineering, and labor relations. Publish quarterly scorecards: median location error by wing, alert true-positive rate, help-desk ticket themes, and spare inventory weeks-on-hand. Vendors who balk at transparency rarely improve after contract award.

Technical due diligence workshops (make vendors sweat productively)

Schedule multi-day deep dives, not marketing webinars. Day one: architecture—brokers, databases, message buses, certificate hierarchies. Day two: RF—live packet captures, anchor failover drills, simulated tag storms. Day three: operations—exports for discovery, role-based access, break-glass accounts, and audit logs immutability. Require engineers with commit authority, not only sales engineers. Record minutes with action items; vendors who refuse written follow-ups are signaling post-award risk.

Invite your wearable OEM (for example REFINE Technology supplying CO-EYE BLE tags) to sessions covering firmware signing, FCC ID scope, and battery life test methodology. Platform vendors must demonstrate certified integration paths with their chosen anchors, not hand-waving about “custom adapters.”

Support SLAs: response times that respect custody clocks

Define severities with custody language: Severity-1 might be “map unavailable during lockdown,” Severity-3 “single-wing degraded accuracy.” Tie each to response and restoration targets, escalation phone trees, and on-site dispatch clauses for integrators within driving distance. Clarify whether cloud SaaS incidents invoke shared status pages or only vendor-internal tickets. If your state requires CJIS-aligned personnel for certain touchpoints, embed that constraint contractually—do not discover it during a 0200 outage.

Evidence exports, discovery, and chain of custody

Prosecutors and plaintiff’s counsel will request location histories with metadata: device IDs, firmware versions, anchor IDs, filter parameters, and clock sources. Ask vendors to demo an export end-to-end: operator click → signed archive → verification hash. Confirm whether exports embed WGS84 coordinates only or also facility-relative grid indices usable in CAD overlays. The goal is repeatable, explainable evidence—not a pretty PNG map that collapses under cross-examination.

Align retention policies with state records schedules; some agencies must purge juvenile-adjacent data faster than adult metrics. Your vendor should support granular retention rules without forcing a single global TTL.

Financial models: capex, opex, and chargebacks

Split pricing into capex (anchors, cabling, servers), opex (licenses, cloud egress, support), and consumables (straps, batteries, whole-tag replacements). Some vendors blur lines with “per-bed per-month” bundles—reverse-engineer the implied tag replacement rate; if it assumes unrealistically low mortality, your out-year budget breaks. For multi-site states, negotiate enterprise licensing with true-ups tied to audited active tags, not nominal licensed capacity.

Chargebacks between facilities should reflect utilization and incident-driven support costs, or richer jurisdictions subsidize poorer ones unintentionally. Publish the formula in the steering committee charter to survive leadership turnover.

Innovation roadmap clauses without locking vaporware

Ask vendors for a 24–36 month roadmap with committed interfaces (APIs, data schemas) even when features slip. Beware contracts that promise “AI forthcoming” without defining training data ownership—your maps are sensitive. Prefer roadmap language that ties deliverables to open extension points: new tag profiles, additional message topics, plugin hooks for analytics. Hardware partners like REFINE Technology can often ship silicon improvements on independent cadence if software contracts permit certified device additions without full re-procurement.

Risk register: assign owners, not vibes

Maintain a living risk register spanning cybersecurity, custody operations, vendor solvency, and supply-chain concentration. For each risk, document likelihood, impact, mitigation, residual risk, and named owner on both agency and vendor sides. Review quarterly in steering committee. Common blind spots include: over-reliance on a single overseas fab for tags, ambiguous data breach notification timelines, and integrator subcontractor churn. The register becomes attachment evidence during audits and bond hearings about prudent procurement.

When scoring references, ask peer agencies not only “Does it work?” but “What broke in the first 90 days after go-live?”—that window reveals training gaps and cabling defects more than polished demos.

Accessibility, Section 508, and operator UX

Operator consoles must remain usable under stress: colorblind-safe palettes, scalable typography, keyboard navigability, and screen-reader labels for critical alert queues. Vendors should provide VPATs or equivalent accessibility conformance statements. In corrections, night-shift contrast matters as much as daytime demos—validate UI themes under dim lighting conditions used in real control rooms, not only conference room projectors.

Conclusion

Great prison RTLS vendor evaluation is less about logos and more about measurable service levels, integration contracts, and hardware sustainability. Whether you lean bundled or best-of-breed, insist on pilot gates, open exports, and tag metrics that survive cross-examination. The right platform vendor respects a separate hardware certification path—because custody technology ages in dog years, and the agency that can swap wearables without rewriting software retains leverage for decades.

Bring certified hardware to your next RTLS bid

Connect with RTLS Command Network for REFINE Technology OEM BLE wearables designed for integrator-led correctional RTLS programs. We do not supply AOA base stations or positioning infrastructure.

Contact Sales