Intended and Not Intended Use

Intended and Not Intended Use

Intended Use

The Shadowtrack Enrollee App is intended for use by persons who are legally required to be monitored by government agencies or courts for legal purposes. 

Not Intended Use

The ShadowTrack Enrollee App is not intended to be used for:
  1. Monitoring and tracking an Enrollee past an Enrollee's end-of-monitoring date
  2. Monitoring and tracking a person outside of an approved agency's or court's direction or discretion
  3. Tracking other people, animals, or objects for personal or financial gain unless prior written approval is obtained by ShadowTrack Technologies
The Shadowtrack Enrollee App must be used according to the instructions described in this manual. All other use is considered unintended use. It shall be used only with technology, software, applications, and accessories approved by ShadowTrack Technologies.

    • Related Articles

    • How to Use the Search Bar within the Platform

      How to Use the Search Bar within the Platform The search bar, located in the top right corner of the platform, is a powerful tool that allows you to quickly find and access information about Users, Enrollees, Corrections Officers, Victims and ...
    • Handling a Wrong Phone Number for an Enrollee

      Overview Sometimes, non-enrolled individuals contact us frustrated about receiving calls or messages from Shadowtrack. This typically happens when an officer mistakenly enters the wrong phone number for an enrollee, or the enrollee changes their ...
    • Resetting a User's Password

      Overview If you need to reset a user's password or require them to change their password upon their next login, follow the steps outlined below. Step-by-Step Guide to Reset a User’s Password Search for the User: Locate the user by searching for their ...
    • Creating Device Protocols for an Entity

      Purpose of Hardware Protocols Any enrollee who is assigned hardware should have a protocol assigned to them A hardware protocol allows you to designate automated steps of action to occur when an alarm is triggered for the hardware. The action steps ...
    • Creating ShadowDevice Protocols for an Entity

      Purpose of Hardware Protocols Any enrollee who is assigned hardware should have a protocol assigned to them A hardware protocol allows you to designate automated steps of action to occur when an alarm is triggered for the hardware. The action steps ...