ShadoWatch
ShadoWatch Device Communication Details
Within the enrollee profile there is a tab titled "Hardware". When hardware is assigned to an enrollee you can view the device communication information from here. ShadoWatch Device Communication Information Navigate to the "Hardware" tab within the ...
ShadoWatch Removal
Prerequisites Removing the ShadoWatch is a straightforward process. Although not required, using a tool to gently pry off the security covers can make the removal easier. Removal Pry off the security screw covers by hand or with a small tool to ...
New Enrollment - ShadoWatch
Creating the Enrollee Profile To create a new enrollee profile: Go to the Enrollees tab from the main navigational menu Next select the +Enrollee button Enrollee Info The 4 step enrollment wizard will open, complete the following steps: Enrollee Info ...
ShadoWatch Alarms in Devices Tab
Accessing the Alarms in the Devices Tab To access the alarms dashboard: Select the Devices tab on the main navigational menu, Then select the Alarms sub-tab Dashboard Features The alarm dashboard gives you an overview of all alarms in any state for ...
Creating a ShadoWatch Protocol for an Entity
Purpose of Hardware Protocols Any enrollee who is assigned hardware should have a protocol assigned to them A hardware protocol allows you to designate automated steps of action to occur when an alarm is triggered for the hardware. The action steps ...
Cleaning and Disinfecting Hardware
Requirements Scrubbing Bubbles Non-abrasive scrub (Toothbrush recommended) Paper towels or dry rag Protective gloves (optional) Cleaning and Disinfecting Process Place the hardware in the sink or desired cleaning area. Make sure the area is clean ...
How to Identify the IMEI Number for a ShadoWatch
How to Identify the IMEI Number for a ShadoWatch Each ShadoWatch is equipped with a silver sticker on the back that displays the IMEI number of the device. If this sticker is missing or has fallen off, you can still identify the IMEI number by ...
Understanding ShadoWatch Tracking Methods
ShadoWatch Tracking Methods ShadoWatch employs multiple tracking methods to ensure accurate and reliable location data. This article explains how ShadoWatch tracks via GPS, Wi-Fi, Location-Based Services (LBS), and Bluetooth, along with the details ...
Troubleshooting Hardware
Introduction These steps should be taken and verified before any hardware is considered defective Prerequisites Before attempting to troubleshoot a hardware related issue, ensure that there is not any visible damage to the equipment in question. ...
Previous Firmware Versions for the Watch and Ankle Devices
It is important to note the previous firmware version for the watch and ankle hardware because the firmware must be updated with each new version one at a time (in order) until it can be updated to have the latest firmware. The date in the middle of ...
Default Protocols for the ShadoWatch
What is a Default Protocol Default protocols are ideal when multiple enrollees utilize the same ShadoWatch protocol. Default protocols are set at the entity level and once enabled, the default protocol is automatically assigned to a new enrollee ...
Create a ShadoWatch Schedule
Purpose of Creating a ShadoWatch Schedule A watch schedule should be created anytime that you want to determine if the enrollee is inside or outside of a specific inclusion or exclusion zone. Although the ShadoWatch will report the tracking location ...
Add a New Enrollee: ShadoWatch
If the user's entity has integrated their case management software with the ShadowtrackONE Platform, the user will not be able to manually add a new enrollee in the application. Additionally, the following fields will not be editable on the ...
Assigning/Activating the ShadoWatch Hardware
Assign Hardware to an Enrollee On the enrollee profile, select the Services>Device tab Select the Actions button>Assign Device Next, search by the Hardware ID number of the device you would like to assign to the enrollee, double click to assign The ...
Transferring ShadoWatch Inventory to another Entity
These steps will guide you through the process of transferring inventory within ShadowtrackONE. Prerequisites Log in to ShadowtrackONE with a TenantAdmin or SysAdmin account. Steps Navigate to the "Devices" section on the website. Click on the ...
How to Read the Signal Strength After a Device Com Timeout
How to Read the Signal Strength After a Device Com Timeout An additional button is a location in the enrollee's profile to explain why there was a Device Com Timeout, Device Com Timeout Escaladed, No Location, or No Location Escalated. Often these ...
Enabling/Disabling Auto Resolve for Alarms
What is the Auto Resolve Feature for Alarms Alarms can be set up to auto clear. This means that if an Alarm occurs and a subsequent event occurs to clear the Alarm, the Alarm will automatically move into a cleared status. Example: A Low Battery Alarm ...
Create a Grace Period for an Alarm
A Grace Period allows for a designated period of time before the Protocol steps begin to occur when an Alarm is triggered. For instance, the User may decide that if the Enrollee leaves their designated location inclusion zone for a few minutes they ...
Assign a ShadoWatch Protocol to an Enrollee
Protocol Assignment Options A Protocol should be assigned to the Enrollee so that someone is notified in the event of an Alarm. You can only see protocols for your entity and any of your sub-entities. Protocols can be assigned to enrollees in one of ...
ShadoWatch Features & General Knowledge
ShadoWatch Features The ShadoWatch uses 4G The watch uses a combination of GPS, WI-FI, LBS and Bluetooth for interior and exterior tracking The tracking priority is GPS > WI-FI > LBS The watch features real-time tracking that is recorded in the ...
ShadoWatch Installation: A Step-by-Step Guide
Please ensure you have all the necessary items listed below before beginning the installation process. Proper installation is crucial for the optimal performance and comfort of the ShadoWatch. Items Needed for Installation Before starting, ensure you ...
Keeping the ShadoWatch Safe from Water Damage: A Comprehensive Guide
The ShadoWatch is water, splash, and dust resistant. It has been rigorously tested under controlled laboratory conditions and has an IP68 rating under IEC standard 60529. This rating signifies that the ShadoWatch can survive up to 30 minutes ...
Caching and Dumping Locations On The ShadoWatch
Understanding Caching and Dumping Locations Caching Locations: Caching refers to the temporary storage of location data on the device itself when it is unable to send this data to the server in real-time. This situation can arise due to network ...
Address Proximity Auto Center
Auto Center This logic only applies to circle zones, not polygons or state/county zones. Whenever a WiFi or GPS location point falls within a 300-foot radius of a designated zone, the system will automatically reposition the point to the zone's ...
Configuring Location Frequency for ShadoWatch
The ShadoWatch offers various location frequency options to cater to different monitoring needs. This guide will walk you through the steps to configure the location frequency of your ShadoWatch and explain the available frequency options. Available ...
Reviewing Tracking Data for Hardware
Reviewing Tracking History In order to review tracking data for a specific enrollee: Search for the Enrollee by Name Go to the Locations > History tab The location history tab shows "Today" by default for hardware showing the last 20 location points ...
ShadoWatch Alarm Types
ShadoWatch Alarm Types: A Comprehensive Guide These alarms are categorized into Battery Alarms, Zone Alarms, Communication Alarms, Tamper Alarms, and Other Alarms. Each category serves a specific purpose, alerting users to potential issues or ...
Unassigning/Deactivating the ShadoWatch Hardware
UnAssign Hardware From the Enrollee Search for the desired enrollee by name form the universal search Once on the enrollee profile, select the Hardware>Device tab Select the Actions button>Unassign Device Next, you will be prompted to select an ...