Detention Facilities Communication Companies

The two largest detention facilities communications companies are Global Tel*Link (GTL) and Securus Technologies. According to an analysis performed by the Prison Policy Initiative, as of 2018, GTL and Securus accounted for about 83% of the market, with GTL occupying 43% of the market and Securus occupying 40% of the market.

Prepared by Professor Meredith Martin Rountree and several students of the Northwestern University Pritzker School of Law


Global Tel Link          Securus          Zoom

The two largest detention facilities communications companies are Global Tel*Link (GTL) and Securus Technologies. According to an analysis performed by the Prison Policy Initiative, as of 2018, GTL and Securus accounted for about 83% of the market, with GTL occupying 43% of the market and Securus occupying 40% of the market.{1} 1  Petition to Deny, In re TKC Holdings Inc., WC Docket 18-193 (FCC July 16, 2018).

Global Tel Link (GTL)

GTL is a Virginia-based detention communications company that contracts with 2,300 facilities in 50 states.{2} 2  GTL Leadership By the Numbers, GTL, (last visited May 18, 2020). According to GTL’s website, 1.6 million incarcerated persons—or 74% of incarcerated persons in the U.S.—use its services.{3} 3  Id. GTL provides correctional facilities with a web-based telephone platform, which records and stores calls made to and from detention facilities, tablets detainees can use to read e-books and make phone and video calls, and other services. GTL also operates a lab that extracts “digital evidence” from digital devices seized in detention facilities. This evidence is used to “stop and solve crimes.”{4} 4  Stopping Crime Before It Happens – Intelligence Tools, Analysts Prevent Planned Attacks, GTL, (last visited May 18, 2020).

Media coverage

Most of the media coverage of GTL has related to the exorbitant rates detainees must pay in order to make phone calls. In the past few years, however, GTL has received a fair amount of media coverage related to privacy issues. In 2018, the company came under fire when it came to light that 34,000 calls between Orange County incarcerated persons and their attorneys were illegally recorded.{5} 5  Todd Harmonson, Nearly 34,000 Orange County Inmates’ Calls to Attorneys Recorded, Not the 1,079 Originally Reported, (last visited May 18, 2020). An Orange County Grand Jury report published afterwards determined that several of the calls had been accessed, and that some information from these calls was provided to the county’s District Attorney.{6} 6  Elizabeth Weill-Greenberg, ‘Do Not Record’, (last visited May 18, 2020). GTL has since acknowledged that something similar occurred in two Florida counties in 2014.{7} 7  L.A. Times Editorial Board, Editorial: Attorney-Client Communications in Jail are Supposed to be Confidential. They’re Not, L.A. Times (Sep. 11, 2018, 4:05 AM),


There has not been very much media coverage of privacy-related litigation against GTL, but at least one lawsuit was filed after GTL’s recording of attorney-client communications in Orange County. In 2019, a group of detainees and attorneys filed a class action lawsuit seeking $500 million in damages, $5,000 for each recorded attorney-client call.{8} 8  Scott Schwebke, Lawsuit seeks $500 million in Orange County Jail Phone Scandal, The Orange County Register (April 4, 2019 at 6:47 PM), The lawsuit appears to be ongoing.

  • Mark Moon v. County of Orange et al. 8:19-cv-00258

Securus Technologies

Securus is a Dallas-based detention communications company. Its phone system allows prisons and jails to monitor and record both placed and received calls and then store them. As of 2015, the company purported to contract with 1,900 correctional facilities, and their database included over 100 million call records.{9} 9  Jordan Smith & Micah Lee, Not So Securus, The Intercept (November 11 2015, 11:43 AM), Recently, the company has developed an app that allows users to conduct video calls and send photos, e-cards, and short video messages.{10} 10  Securus Technologies, (last visited May, 18 2020).

Media coverage

Like GTL, most media coverage of Securus involves the cost of making calls from detention facilities. However, Securus has also received a substantial amount of privacy and Sixth Amendment-related media coverage.

For example, a 2015 security breach of Securus’s records received extensive media coverage. The breach allowed a hacker to access 70 million phone calls, which involved prisoners in 27 different states.{11} 11  Smith, supra, note 9. According to the Intercept, the records included “prisoners’ first and last names; the phone numbers they called; the date, time, and duration of the calls; the inmates’ Securus account numbers” and links allowing recordings of the calls to be downloaded. The hacked records included at least 14,000 recorded conversations between attorneys and their incarcerated clients, despite the fact that Securus had stated that it did not record these phone calls.{12} 12  Id. Securus’s system was also breached in 2014, when a hacker gained access to three of former NFL player Aaron Hernandez’s personal phone calls while he was awaiting trial.{13} 13  Id.

Continue reading below

In 2017 and 2018, Securus also received media attention for privacy related issues when it came to light that the system could be used to “find the whereabouts of almost any cellphone in the country within seconds,” and that it was not properly vetting surveillance requests from customers.{14} 14  Jennifer Valentino-DeVries, Service Meant to Monitor Inmates’ Calls Could Track You, Too, N.Y. Times (May 10, 2018), The New York Times reported that criminal justice actors were using the service to track peoples’ location without court orders.{15} 15  Id. For example, one official used Securus to track down a woman who left a drug rehab center before she was supposed to.{16} 16  Id. Another report from 2018 drew attention to the fact that the system could be used to obtain and share the cellphone information of anyone who was called by an individual in a detention facility that contracted with Securus.{17} 17  Neema Singh Guliani & Nathan Freed Wessler, Company That Handles Prison Phone Calls Is Surveilling People Who Aren’t in Prison, ACLU Blog (May 11, 2018, 10:00 AM),

In 2019, Securus’s voice recognition technology also received some media coverage. The technology “extract[s] and digitize[s] the voices of incarcerated people into unique biometric signatures, known as voice prints.”{18} 18  George Joseph & Debbie Nathan, Prisons Across the U.S. Are Quietly Building Databases of Incarcerated People’s Voice Prints, The Intercept (Jan. 30, 2019, 10:00 AM), The voice prints are then added to a database that can be used to search for other calls made by that individual.{19} 19  Id. According to the Intercept, the technology can also mine outside parties’ voiceprints.{20} 20  Id. This allows investigators to track ‘“suspicious activities,” such as “multiple inmates speaking to one person on the outside on a reoccurring basis.’”{21} 21  Id. There has also been some media coverage of privacy litigation that Securus has been involved in, which I’ve outlined below.


The two privacy-related lawsuits that have received the most media attention were brought by groups in Kansas and Austin. 

Austin lawsuit

Continue reading below

Featured Products

In 2014, the Austin Lawyers Guild, the Prison Justice League and several defense attorneys filed a class action lawsuit against Securus and the Travis County DA and Sheriff’s office alleging that Securus recorded privileged phone conversations between incarcerated persons and their attorneys, and that prosecutors later accessed and listened to these recordings.{22} 22  Jordan Smith, Securus Settles Lawsuit Alleging Improper Recording of Privileged Inmate Calls, The Intercept (Mar. 16, 2016, 11:03 AM), The plaintiffs requested that the judge declare the practice unlawful, enjoin the defendants from continuing to record, disclose, and use these communications, and order the defendants to destroy all unlawfully recorded attorney-client communications.{23} 23  Complaint, Austin Lawyers Guild v. Securus Techs, Inc., No. 1:14-cv-00366-LY (W.D. Tex. July 23, 2014). The case settled in 2016.{24} 24  Smith, supra note 22.

Kansas lawsuits

In 2017, two lawsuits were filed against Securus and Leavenworth Detention Center’s operator—CoreCivic. They alleged that the defendants had improperly recorded privileged attorney-client communications in violation of state and federal wiretap laws. One lawsuit was filed by former detainees at Leavenworth and the other by two attorneys with clients at Leavenworth.{25} 25  Dan Margolies, Bombshell In Leavenworth Tapings Case: 1,300 Public Defender Calls Recorded Over Two Years, KCUR (June 6, 2018, 9:20 AM), Discovery revealed that more than 1,300 phone calls between public defenders and their clients had been recorded, and the U.S. Attorney’s office acknowledged that prosecutors had listened to some of the recorded calls.{26} 26  Id. The case filed by detainees turned into a class action lawsuit, which ultimately reached a settlement agreement requiring Securus to pay $350,000.{27} 27  Id. The case filed by the attorneys appears to still be ongoing.

  • Romero v. Securus Techs., Inc., 16-cv-1283-JM-MDD (S.D. Cal. 2018)
  • Hernandez v. Securus Techs., Inc., 1:16-cv-12402-RGS, 2017 WL 826915 (D. Mass. Mar. 2, 2017)
  • Johnson v. CoreCivic, No. 4:16-CV-00947-SRB, 2018 WL 7918162 (W.D. Mo. Sept. 18, 2018)
  • Huff v. CoreCivic, Inc., No. 17-2320-JAR-JPO, 2018 WL 1175042 (D. Kan. Mar. 5, 2018)
  • Guild v. Securus Techs., Inc., No. 1:14-CV-366-LY, 2015 WL 10818584 (W.D. Tex. Feb. 4, 2015)


The use of Zoom for attorney-client communications, along with concerns about the security of the platform, has increased substantially over the past few months. The increased use of the platform has raised a number of ethical concerns about how to maintain attorney-client privilege and keep client information private more broadly.

Ethical Uses of Technology

Federal Guidance

The ABA’s Model Rules impose general requirements on attorneys who use digital technology to communicate confidential or privileged information. Rule 1.1, Comment 8, requires that attorneys “keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology….”{28} 28  Model Rules of Prof’l Conduct, r. 1.1 cmt. 8 (Am. Bar Ass’n 1983). Most states have adopted the language of this rule or similar language into their own ethical codes. Furthermore, under Rule 1.6, lawyers are required to “make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.”{29} 29  Model Rules of Prof’l Conduct, r. 1.6(c) (Am. Bar Ass’n 1983). What constitutes “reasonable efforts” is not specifically defined. Instead, whether efforts are reasonable depends on a number of nonexclusive factors that include “the sensitivity of the information, the likelihood of disclosure if additional safeguards are not employed, the cost of employing additional safeguards, the difficulty of implementing the safeguards, and the extent to which the safeguards adversely affect the lawyer’s ability to represent clients.”{30} 30  Model Rules of Prof’l Conduct, r. 1.6(c) cmt. 18 (Am. Bar Ass’n 1983).

In Formal Opinion 477, the ABA offered a number of considerations attorneys should take into account when deciding what type of security client information and communications warrant.{31} 31  See ABA Comm'n on Prof'l Ethics & Prof'l Responsibility, Formal Op. 477R (2017). Numbers one, two, three, four, and seven are particularly relevant in the Zoom context. Number one is to “understand the nature of the threat.”{32} 32  Id. at 5. This means evaluating both the nature of the client information at risk as well as the risk of “intrusion” into the matter.{33} 33  Id. Higher risk scenarios require greater efforts to protect client information and communications.{34} 34  Id. The second is to “understand how client confidential information is transmitted and where it is stored,” so as to better understand how it could land in the hands of unauthorized parties.{35} 35  Id. at 6. The third is to “understand and use reasonable security measures.”{36} 36  Id. This requires that lawyers understand how to take steps to protect client information, such as creating appropriate passwords, updating software, and encrypting sensitive client information.{37} 37  Id. The fourth is to “determine how electronic communications about client matters should be protected.”{38} 38  Id. at 7. For example, attorneys should know when the sensitive nature of information makes password-protection or encryption appropriate.{39} 39  Id. Importantly in this particular context, “lawyers should be cautious in communicating with a client if the client uses computers or other devices subject to the access or control of a third party,” since privilege and confidentiality could be waived.{40} 40  Id. Finally, the seventh is that attorneys should “conduct due diligence on vendors providing communication technology,” which means evaluating whether or not the safeguards that a particular platform employs are sufficient.{41} 41  Id. at 9.

State Guidance

State guidance on ethics and technology have come from two primary sources: state supreme courts and state bar associations.

State Supreme Court orders: Most state supreme courts have issued orders relating to court operations during Covid. In most cases, these orders include information related to conducting remote trials, but they don't contain anything about videoconferencing or Zoom outside of the trial context.

State Bar Association opinions: Pennsylvania is the only state bar association that I could find that has issued a relevant ethics opinion.{42} 42  P.A. Bar Ass'n Comm. on Legal Ethics & Prof'l Responsibility, Op. 2020-300 (2020). Titled "Ethical Obligations for Lawyers Working Remotely," the opinion deals mostly with how to maintain confidentiality via electronic communications platforms generally, but it does not mention Zoom specifically.{43} 43  Id.

State Bar Association websites: Some state bar associations have articles and blog posts on their website related to Zoom and confidentiality, but these were mostly written by in-state lawyers and not the Bar Association itself. The information and advice they include is summarized below.

Application in the Zoom context

Given these considerations, there are a number of steps attorneys can take in the Zoom context to prevent the disclosure of attorney-client communications. First, attorneys can create password-protected meetings and use settings to prevent participants from being able to record the meeting or share their screens.{44} 44  David Saunders & David Greenwald, INSIGHT: Zooming and Attorney-Client Privilege, Bloomberg Law (May 22, 2020, 3:01 AM), They can also create “Waiting Rooms,” which allow the host of the meeting to admit meeting participants individually. The meeting can then be locked once all participants have been admitted.{45} 45  Id. Additionally, attorneys should probably refrain from recording conversations with clients. These recordings can be stored by Zoom, which not only opens the door to the potential waiver of attorney-client privilege, but could also potentially lead to that recording being subpoenaed or shared.{46} 46  Id.

Attorneys may also want to gain a general sense of the type of security problems that Zoom users have encountered and whether or not Zoom has fixed these problems. For example, in March, after it came to light that Zoom was sharing user data with Facebook, Zoom removed this feature from platform.{47} 47  Rae Hodge, Zoom Security Issues: Zoom Buys Security Company, Aims for End-to-End Encryption, CNET (May 8, 2020, 12:23 PM), Similarly, after hundreds of reports of “Zoombombing,” the company enabled the “waiting rooms” feature and made password protection possible for all calls.{48} 48  Id. But there are other potential security problems with the app that the company has not resolved. First, although the company purported to use end to end encryption in its marketing materials, in late March, a report by the Intercept revealed that it did not.{49} 49  Micah Lee & Yael Grauer, Zoom Meetings Aren’t End-to-End Encrypted, Despite Misleading Marketing, The Intercept (March 31 2020, 3:00 AM), In April, Zoom bought security company Keybase in order to develop this feature,{50} 50  See Hodge, supra, note 45. but it has not announced when the feature will be available. Second, in April, a research firm identified a bug in the platform that could allow third parties to record Zoom meetings without participants’ knowledge, even if the host has removed participants’ ability to record the meeting via the settings.{51} 51  Id. This problem does not appear to have been acknowledged or addressed by Zoom yet.