AFIS Interoperability
|
|
- Sharlene Daniels
- 6 years ago
- Views:
Transcription
1 The magazine dedicated exclusively to the technology of evidence collection, processing, and preservation Volume 6, Number 1 January-February 2008 AFIS Interoperability SOME OF THE TOPICS IN THIS ISSUE AFIS interoperability: now and in the future Storage technology for P&E rooms Basic theory behind alternate light sources Interview with John S. Morgan of the NIJ
2 AFIS interoperability Leaders in the field of latent-print identification are starting to look for an enter once, search many solution. IT IS DIFFICULT to find anyone who denies the power of automated fingerprint identification systems (AFIS) and the benefits they bring to the field of latent-print identification. But ask any expert to list some of the weaknesses of AFIS systems as a whole and one item is likely to appear at the top: interoperability. The term AFIS interoperability refers to the ability of different AFIS systems to communicate efficiently and effectively with one another. But currently, the proprietary variations between AFIS systems that were created by different manufacturers and some- Written by Kristi Mayo times even variations between system versions that were created by the same manufacturer can cause interoperability problems. In other words, they can prevent examiners from being able to search a latent print encoded on their own AFIS system against another agency s AFIS system. In a perfect world, experts suggest, a latent-print examiner would be able to capture a latent-print image once, encode it once, and then search it against as many fingerprint or palmprint databases as might be necessary. Interoperability which is often rephrased as enter once, search many has been an issue for as long as AFIS systems have been around. But over the last few years, the concept has stepped into the national spotlight. Currently, the National Academy of Sciences (NAS) Forensic Science Committee is engaged in eight specific tasks related to evaluating the needs of the forensic-science community. The seventh item on their lists of tasks is to examine the interoperability of AFIS systems. In ongoing meetings, the committee has heard from a number of experts on the subject. Meanwhile, the National Institute of Justice (NIJ) is in the process of 12 In today s world, there is a limited amount interoperability between independent AFIS systems. A local system (the Local W, for example, in this diagram) can run a search for fingerprint matches in the AFIS database maintained by its own state (State A) and the search can then be directed to the FBI s national IAFIS database. But Local W cannot search the AFIS database of another state (State B), even if the two states are geographic neighbors. In addition, Local W is also probably unable to search other local AFIS systems within its own state s boundaries (such as Local X in the diagram), not to mention those in another state (Local Y and Local Z ). This limited amount of interoperability severely limits law enforcement s chances of tracking down suspects. Evidence Technology Magazine January-February 2008
3 AFIS INTEROPERABILITY forming an AFIS Working Group to carefully study the topic of AFIS interoperability, as well as a large-scale interoperability study. Prominent leaders in the field, such as Joe Polski, chief operations officer of the International Association for Identification (IAI), hope these actions may be the beginning of moving the concept of AFIS interoperability into the realm of reality. Right now, we are at the problemidentification stage with AFIS interoperability, said Polski. There are all kinds of policy issues, technical issues, and legal issues all sorts of things that would need to be dealt with. But nobody has ever really sat down and looked at this particular issue from a standpoint of What do we have to do to make it work? Tenprint vs. latent-print applications When discussing AFIS interoperability, it is important to make the distinction between the two major AFIS applications: tenprint data and latent-print data. Peter Komarinski, principal of Komarinski & Associates, LLC and chair of the IAI s AFIS committee, explained that the technology of searching tenprints against tenprints with the system has already been advanced to the point of near automation. In a perfect world, you could capture a latent-print image once, encode it once, and then search it against as many fingerprint or palmprint databases as might be necessary. When folks are fingerprinted for tenprint applications, images of all ten fingers are captured, said Komarinski. In fact, frequently they are captured twice, because they will take rolled impressions of the individual fingers, then they will take the plain impressions. A tenprint will generally go to the state, and then in many cases it will be forwarded on to the FBI. You have a lot of information to work with, so you have a lot of opportunities for not only making identifications, but also you can link into the FBI to find out if there s a want or warrant in another state. The latent-print side of searching AFIS systems, however, is not so easy or straightforward. When you get to the latent-print side of the business, you are not dealing with all ten images. In fact, in many cases, you are not dealing with a very good image. So your opportunity for making that identification on a latent print from a crime scene is pretty much limited to three things: the skill of the examiner who is searching your AFIS system, the sophistication of the AFIS system, and the size of the database on the AFIS system. Launching latent-print searches across state lines In most cases, a latent-print examiner will search their local AFIS system (if available) and then move on to search their state s AFIS system. The old saying that local criminals commit local crimes holds true most of the time. However, it is understood that criminals do not limit themselves to political or geographical boundaries. This fact is especially important to recognize for jurisdictions that lie close to state lines. In such cases, it is highly desirable to have the ability to search the databases of neighboring jurisdictions. Currently, however, getting access to another agency s fingerprint database is not as simple as it might seem. In a perfect world, there would be a high degree of interoperability between databases of all levels of law-enforcement agencies. The Local W could search all of the databases in its own state (Local X, for example), as well as those in all of the other states (such as Local Y and Local Z ). Local W could also direct searches to its own state database (State A ) and independently access the national IAFIS database. In addition, each of the 50 state AFIS systems would be able to work together without problems or issues. That is how it would be in a perfect world and such a perfect world may not be too far in the future. Evidence Technology Magazine January-February
4 AFIS INTEROPERABILITY 14 As part of a grant from the NIJ, the IAI recently investigated a real-world interoperability situation: Getting the New York City Police Department s AFIS system to be able to search the New Jersey State Police s AFIS system. This would appear, on the surface, to be a pretty easy process, said Komarinski. They are next to each other, separated only by the Hudson River. Both systems have the same vendor, so there shouldn t be a major problem with conversions and such. But, nonetheless, there are a number of issues that we have run into. One issue is that although they use the same vendor, they have different levels of software. Think of a 2008 automobile trying to use equipment from a 2004 automobile. They are pretty close, but not identical. There are also different ways in which the searches take place different screens that the examiners use. That s on an operational end, Komarinski continued. On the legal end, of course, you need agreements between these two entities that they are willing to share their databases and their information, and also that they are willing to protect themselves from any liability that may come up in the future. With the difficult issues that were revealed through this project, it may seem that a better answer to AFIS interoperability would be a larger database containing fingerprint images from people across the country. That database exists, of course: the FBI s Integrated Automated Fingerprint Identification System (IAFIS) the federal database that contains the print records of more than 50 million individuals in the Criminal Master File. Since it was first introduced in 1999, IAFIS has become an increasingly user-friendly method of searching for matches to latent prints. The FBI s Criminal Justice Information Service (CJIS) Division has worked to make access more widely available to local agencies, and distributes the free Universal Latent Workstation (ULW). This software allows users to remotely encode latent prints and search them against IAFIS. The system is getting faster, too. Where it used to take hours to get a The IAFIS database is only as strong as the data uploaded to it...and there is a lot more information just sitting in local AFIS systems. Many agencies don t send everything because it is more work to do that. response after launching a latent search in IAFIS, examiners now frequently get a response in about ten minutes. The FBI s Next Generation Identification (NGI) system, currently under development, promises to speed up responses even more, and will also add palmprint search capabilities. In spite of those efforts by the FBI s CJIS Division, Komarinski said that searching IAFIS has not been widely embraced by the latent-print community as an easy way of searching latent prints. Often, he said, after an examiner has taken the steps to search their local or state system creating a new case number, capturing a latent-print image, making any necessary digital enhancements, and identifying the minutiae points it becomes necessary to begin the entire process over again in order to get the latent print ready for a search in IAFIS. If they have to start the case over again, it becomes very demanding on resource allocation, said Komarinski. If your choice is to do more searches on your local system or spend that same time searching the FBI s system, frequently the decision is not to search IAFIS. There are only so many hours that the examiner has. Easy access to IAFIS continues to be an issue for many local agencies, as well, according to Polski of the IAI. I have to give the FBI credit. They are working to make access to IAFIS easier and more accessible to the local agencies, he said. But not every local agency has access to IAFIS. That is due to a host of problems. For example, we hear from local agencies that want to access IAFIS, but their state will not let them because policies exist that the states must approve local access into IAFIS. So even though the local agency wants to, the state won t let them. Training, resources, and time may also prevent agencies from linking up to IAFIS. Being able to access the FBI s database (for searching latent prints) and actually doing it are two different things, said Komarinski. They will provide software so that you can search their database, but that does not necessarily mean most agencies will go through the requirements in terms of setting up a separate Originating Agency Identifier (ORI) number, getting a dedicated computer, and then training their people to use it. Even if every local agency had a foolproof way of accessing IAFIS, Polski explained that they would not be tapping into a complete database of every fingerprint or palmprint available in the country. The IAFIS database is only as strong as the agencies that contribute to it, and not all information is uploaded to IAFIS. There is just an awful lot more information sitting in those local AFIS systems than there is at the FBI, said Polski. For many years, the FBI would only collect prints from those convicted of more serious crimes. Now, of course, that has changed. Today they will accept anything into their data repository. But many agencies do not send them everything, either, because it is more work to do that. Hurdles standing in the way of AFIS interoperability No one, according to both Polski and Komarinski, has gone so far as to draw a detailed picture of what an AFISinteroperable world might look like. But discussing the concept of AFIS interoperability with experts in the field inevitably elicits detailed descriptions of problems that stand in the way of implementing the concept. A number of these problems were succinctly outlined in September 2007, when the IAI presented a paper to the NAS Forensic Science Committee describing its positions and recommendations on each of the committee s eight tasks. In that paper, the IAI stated Evidence Technology Magazine January-February 2008
5 its support for...the need to pursue the opportunities to improve and increase impression-evidence services via the use of automation technology and electronic networking. The paper then went on to describe some of the major stumbling blocks to AFIS interoperability: Political will The IAI position paper explains that administrators and managers may be reluctant to move forward with change because of the...unknown cost/benefits, increased personnel resources, and unknown impact on current AFIS systems. Because there is no clear picture that shows what kind of system would enable full AFIS interoperability, there currently exist more questions than answers. And that makes it difficult to move forward. Polski posed a few of those questions. If you could launch a search on another agency s system, could they handle it? he asked. Is their system size big enough to just be able to take on all comers? Or if not, how would you throttle the incoming requests? What happens if there is a hit? Is there going to need to be confirmation on the part of the agency that has the print on file? Are they going to need to stop and pull a hard copy, for example? These are the questions that agencies are going to be asking right away. Connectivity/networking Here is one obvious question when you start thinking about one agency being able to search another agency s AFIS system: How do you connect the two systems? For that matter, how would you connect multiple agencies into a broader, more versatile network? The number-one priority is to build a secure infrastructure, said Stephen Dunbar, product manager with NEC Corporation of America, an AFIS manufacturer. He pointed to the FBI s CJIS-WAN (wide-area network), the networking component that currently enables local and state agencies to connect to IAFIS, as an example of an infrastructure that could be used for interstate AFIS connections. Currently, however, the CJIS-WAN is only being utilized by state and local law-enforcement as a means of connecting to the FBI s database not as a method to connect to one another. The FBI has stated that the CJIS-WAN can be used to allow one state to search another state s fingerprint or palmprint repository, but doing so would require every participating agency to have Memorandums of Agreement (MOAs) in place. Here lies the hurdle, states the IAI paper. Obtaining MOAs from all parties is not a simple undertaking and generally requires legal considerations. The expectation of these MOAs being achieved from all parties or in any reasonable timeframe (probably years) is very low. A different approach needs to be considered. National legislation with funding is an alternative. Consolidation The IAI paper points out that there currently exists no central location containing all fingerprint records. The FBI s IAFIS is the closest thing to that kind of collection, but...given the 50 states and the Federal regulations there are as many reasons why all fingerprint records are not centrally located. This issue, if unresolved, points the way toward an electronic network (such as the CJIS- WAN or some other alternative) that would connect the multitude of AFIS systems that exist. Maintaining accuracy When you bring together millions of fingerprint and palmprint records, the technology must be capable of providing the latent-print examiner with a useful, accurate list of candidates. The IAI paper states that the...interoperability of different AFIS technologies can be addressed either from latent-print images or latent-print minutiae templates Both can be supported and are supported by the IAI. From the perspective of an AFIS manufacturer, this might be the most important issue to address. The biggest issue with interoperability that I see has to do with the minutiae strings, said Derald Caudle with AFIX Technologies, Inc. Every company does the extraction differently which is understandable. And they use different parameters for their searching and matching. So when you talk about searching from one system to another, I think it is important to do as the FBI has done with IAFIS: allow for an image-only submission. Testing has shown you can get better results with image-only submission. So, for the individual vendors, I think it is Evidence Technology Magazine January-February
6 AFIS INTEROPERABILITY important that we always maintain that ability with minutiae and with image-only submissions. Dunbar with NEC agreed. There are a lot of people who are shooting for a standard minutiae set, or standard encoding, he said. We think that is a really bad idea, because that reduces the unique advantages of each vendors different coding systems. It lessens the accuracy of everybody. James Jasinski, executive vice president for federal and state systems with Cogent Systems, Inc., expressed doubts for any kind of standardized encoding. The accuracy is always going to be highest when the encoding and the algorithm are more closely aligned, said Jasinski. If you have a generic encoding and a generic algorithm, you are going to get generic results. Workload management In the paper to the NAS, the fifth hurdle to interoperability that the IAI lists is the most brief, but it is also simply to the point: How do you balance your own agency s needs with the high-priority requests of another agency? The most important resource for an agency is its latent examiners, said Dunbar. They are an expensive resource, and you don t want someone from Virginia tying up the latent examiners in Pennsylvania searching their database. So, then, we need to be able to encode the latent at the source, send it to the destination, match it, and then have the candidate list and all the pertinent images needed for verification to come back to the source. That s the model the FBI has used in their ULW software. The major AFIS manufacturers have embraced the ULW concept and worked with the FBI to make the latest versions of their systems work with the ULW software. The ULW application has the ability to translate the minutiae encoding into each major vendors proprietary format and send it, said Dunbar. So that is how our company is embracing interoperability. We figure it is the best way to send latents back and forth without actually impinging on the other locality s people. Creating and utilizing more automation technology may also be a way of reducing the increased workloads that AFIS interoperability may create, according to Jasinski. I think clients and users want to be successful in doing a search, and they want to minimize the amount of work that they have to do. There is a talent associated with latent-print examination. But I think, coupled with the ability to do the encoding, there are automation tools that can achieve the same result without discouraging innovations and inventions in the area, he said. The tools Jasinski suggests would automate the encoding process, similar to the auto-encoding and auto-searching currently available for tenprint searches. If you look at the history of how tenprints were searched initially in the 1970s, 1980s, and 1990s, there was a lot of manual intervention that was required, said Jasinski. Those tools, over time, have been automated so most tenprint searches are done in a completely automated fashion. I think you are going to see the same evolution with the latent world, but you have got to give organizations the incentives to make the investment to do that. The future of AFIS interoperability Those incentives may be difficult to achieve, said Komarinski. He used the analogy of the current financial system where banks from all over the world are networked, allowing users to access their money on demand. You can go anyplace in the world and use your debit card, and because there is an interchange fee involved, everybody is happy, he said. You are happy because as a consumer you can pay for this. The merchant is happy. The financial institutions are happy. Everybody s happy. But we don t have that kind of profit incentive in government. Instead, we have to look for better service and ways of delivering better service. Keeping the issue of AFIS interoperability in the national spotlight might gain the concept some momentum. I hope that with the work of the National Academies and the position paper the IAI has presented, we are going to see some movement in this now that it is being brought up to a level of national attention, said Komarinski. So hopefully it will become more than just a couple of individuals who are saying, This is an issue that really needs to be brought forward. Hopefully that will create some real political will to make these kinds of things happen. As AFIS interoperability still looms in the realm of conceptualization, Polski said there is still work to be done to determine how beneficial it might be to enable law-enforcement agencies to search the untapped records that lie hidden in other agencies fingerprint and palmprint repositories. Some of those benefits may be drawn out by the AFIS Working Group and the interoperability project that has been proposed by the NIJ. I think what the NIJ wants to see is, Okay, if in fact we do pursue this, is there a benefit? Are there going to be more criminals identified? And that is a good question, said Polski. We think there will be more criminals identified. But in the grand scheme of things, when you hook these systems together, maybe there won t be more identifications. I don t know it for a fact, but I sure think that the accessibility to more data would result in more identifications of criminals. INTERNET LINKS FOR MORE INFORMATION: You can download the IAI s position and recommendations to the National Academy of Sciences: And you can get more information and updates about the National Academy of Sciences Forensic Science Committee: 16 Evidence Technology Magazine January-February 2008
Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,
Virtualization Q&A with an industry leader Virtualization is rapidly becoming a fact of life for agency executives, as the basis for data center consolidation and cloud computing and, increasingly, as
More informationIAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2
IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated
More informationFBI Next Generation Identification (NGI)
FBI Next Generation Identification (NGI) Bigger, Better, Faster NGI - Overview for Strategic Planning July 2013 1 IAFIS Database Criminal History File 75.4 million subjects with over 284+ million arrest
More informationUNCLASSIFIED / FOUO UNCLASSIFIED / FOUO
1 Integrated Automated Fingerprint Identification System (IAFIS) IAFIS has lived up to and vastly exceeded performance expectations Now is the time to design for the future, rather than reacting to it
More informationEV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND
EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND MARYLAND DEPARTMENT OF PUBLIC SAFETY AND CORRECTIONAL SERVICES INFORMATION TECHNOLOGY AND COMMUNICATIONS DIVISION FOR
More information2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.
More informationFederal Bureau of Investigation CJIS Division Next Generation Identification
Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment
More informationRequirements for Forensic Photography & Imaging Certification (08/2017)
Requirements for Forensic Photography & Imaging Certification (08/2017) A. General Requirements 1. An applicant for certification must possess a high ethical and professional standing. 2. All applicants
More informationAppendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014
Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Note to Submitters: The information in this document is provided for you to use in any manner most appropriate
More informationCommonwealth of Pennsylvania - Justice Network
Commonwealth of Pennsylvania - Justice Network Published: June 1999 FIORANO CUSTOMER SOLUTION Commonwealth of Pennsylvania uses Fiorano s solution to enhance public safety in the State by enabling Real
More informationTechnical Procedure for the SAFIS/AFIT
Technical Procedure for the SAFIS/AFIT 1.0 Purpose - This procedure describes how to operate the State Automated Fingerprint Identification System/Advanced Fingerprint Identification Technology (SAFIS/AFIT).
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationI I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments:
From: Sent: lleo.gov] arch 24, 2011 1:55 PM To: I Cc: le.gov Subject: White House Domestic Policy Request Attachments: NG[ Summary.pdf; IAQ Data Dictionary.pdf; IAQscreenshot.pdf Attached, please find
More informationSlashing Downtime from 24 Hours to 24 Minutes:
Slashing Downtime from 24 Hours to 24 Minutes: Technology Advancements Make Warm-Site Disaster Recovery Possible Don Beyer Director, Technical Services Oakwood Healthcare Louie Caschera Chief Information
More informationFBI Criminal History Record Certification Program
FBI Criminal History Record Certification Program P. David Morgan Fingerprint Examiner Instructor Federal Bureau of Investigation Criminal Justice Information Services Division Biometric Services Section
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationCybersecurity and the Board of Directors
Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education
More informationDigital Workflow 10 Tech Rules to Guide You
Last updated: 10/11/10 Digital Workflow 10 Tech Rules to Guide You Introduction Whether your goal is to become paperless, or just to get more out of the technology you use, you need to (1) find the easy
More informationISSUE BRIEF SC DMV ELECTRONIC TICKET TRANSMISSION MANDATE (November, 2017)
551 Tollgate Road Suite B Elgin, IL 60123-9357 (847) 922-9480 Telephone stever@ecitationcoalition.com Email www.ecitationcoalition.com ISSUE BRIEF SC DMV ELECTRONIC TICKET TRANSMISSION MANDATE (November,
More informationTCJIUG Texas Criminal Justice Information Users' Group PO Box Austin, TX 78768
TCJIUG Texas Criminal Justice Information Users' Group PO Box 684096 Austin, TX 78768 A statewide organization of law enforcement, communications and information systems personnel working to improve the
More informationKentucky Wireless Information Network Service (Ky-WINS)
2006 NASCIO Recognition Awards Nomination Category: Information Communications Technology (ICT) Innovations Kentucky Wireless Information Network Service (Ky-WINS) Kentucky State Police Kentucky has implemented
More informationPart 1: Information Security for City Governments; Defining e-discovery
Integrating Security Incident Response and e-discovery Transcript Part 1: Information Security for City Governments; Defining e-discovery Julia Allen: Welcome to CERT's Podcast Series: Security for Business
More informationBiometric Center of Excellence (BCOE)
Federal Bureau of Investigation Science & Technology Branch Criminal Justice Information Services Division Biometric Center of Excellence (BCOE) International Association for Identification 100 Year -
More informationTESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE)
TESTIMONY OF MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) BEFORE THE HOUSE JUDICIARY COMMITTEE FEDERAL GOVERNMENT
More informationIT & DATA SECURITY BREACH PREVENTION
IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part 1: Reducing Employee and Application Risks CONTENTS EMPLOYEES: IT security hygiene best practice APPLICATIONS: Make patching a priority AS CORPORATE
More informationCouncil of the European Union Brussels, 23 November 2016 (OR. en)
Conseil UE Council of the European Union Brussels, 23 November 2016 (OR. en) 13323/1/16 REV 1 LIMITE PUBLIC DAPIX 173 ENFOPOL 349 ENFOCUSTOM 163 COSI 156 GENVAL 107 AVIATION 210 NOTE From: To: Subject:
More informationTHE MAGIC OF A MILLION DOLLARS BY MAIL!
THE MAGIC OF A MILLION DOLLARS BY MAIL! (A simple premise that explores the Secrets of Wealth and how a small purchase can lead to $1,000,000) Dear Fellow Wealth Seeker, You ve been pre-approved to join
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationParticipation Agreement for the ehealth Exchange
Participation Agreement for the ehealth Exchange This Participation Agreement for the ehealth Exchange ("Agreement") is entered into as of the last date written below ( Effective Date ) by and between
More informationFROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE
FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE David C. Hay Essential Strategies, Inc In the buzzword sweepstakes of 1997, the clear winner has to be Data Warehouse. A host of technologies and techniques
More informationHow To Make 3-50 Times The Profits From Your Traffic
1 How To Make 3-50 Times The Profits From Your Traffic by Chris Munch of Munchweb.com Copyright Munchweb.com. All Right Reserved. This work cannot be copied, re-published, or re-distributed. No re-sell
More informationalliance FROM DISPATCH THROUGH DISPOSITION Tyler Alliance Leads the Way with Integrated Criminal Justice and Public Safety Solutions
alliance FROM DISPATCH THROUGH DISPOSITION Tyler Alliance Leads the Way with Integrated Criminal Justice and Public Safety Solutions FIRE/EMS Fire and emergency service teams access information faster
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationThe data quality trends report
Report The 2015 email data quality trends report How organizations today are managing and using email Table of contents: Summary...1 Research methodology...1 Key findings...2 Email collection and database
More informationNGI and Rap Back Focus Group Briefing
NGI and Rap Back Focus Group Briefing 2012 SEARCH Annual Membership Group Meeting July 17-19 Brad Truitt Rachel Tucker John Kane 1 Introduction Welcome NGI Update Rap Back Overview/Update Rap Back Focus
More informationDatacenter Care HEWLETT PACKARD ENTERPRISE. Key drivers of an exceptional NPS score
Datacenter Care The things I love about Datacenter Care is the a la carte nature of the offering. The contract is really flexible and the services delivered correspond exactly to what we bought. The contract
More information# Answer Bar Response % 1 (01) Books 0 0% 2 (02) Magazines 0 0% 3 (03) Newspapers 0 0% 4 (04) Commentary 0 0% 5 (05) Drama and Literature 0 0%
Initial Report Last Modified: 01/12/2015 1. *AWARD CATEGORY Please select the award category you are entering (select one only): 1 (01) Books 0 0% 2 (02) Magazines 0 0% 3 (03) spapers 0 0% 4 (04) Commentary
More informationEmerging Market connectivity
Emerging Market connectivity The key to capturing new FX trading opportunities Reaching natural liquidity when trading EM currency pairs requires a connectivity provider that has the resilience and reach
More informationWho We Are! Natalie Timpone
Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who
More informationIf you ve never used Quicken, begin here. This chapter tells you how to
In This Chapter Installing and setting up Quicken Chapter 1 Setting Up Shop Setting up your bank (or other) accounts if you re a first-time user Providing a Quicken overview Solving setup problems If you
More informationThe Use of Technology to Enhance Investigation
The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source
More information5 Challenges to Government IT Modernization: In Brief. Quick tips & facts about IT modernization across federal, state and local governments
5 Challenges to Government IT Modernization: In Brief Quick tips & facts about IT modernization across federal, state and local governments Executive Summary Information technology (IT) modernization can
More informationSiebel Project and Resource Management Administration Guide. Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013
Siebel Project and Resource Management Administration Guide Siebel Innovation Pack 2013 Version 8.1/ September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software
More informationBYOD: A Risk analysis grid for large corporates Corix Partners
BYOD: A Risk analysis grid for large corporates 2013 Corix Partners 1 BYOD: A complex topic for large corporates A large proportion of staff bring personal devices to the office everyday, and use them
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 20000 Lead Auditor www.pecb.com The objective of the Certified ISO/IEC 20000 Lead Auditor examination is to ensure that the candidate
More informationGuiding principles on the Global Alliance against child sexual abuse online
Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child
More informationComprehensive Study on Cybercrime
Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited
More informationRCMP First Nations Community Policing Service
RCMP First Nations Community Policing Service The First Nations Policing Policy, announced by the federal government in June of 1991, provides First Nations communities with control over the policing services
More informationOn 26 Jul 2011, at 19:15, Rory McCune wrote:
On Tue, Jul 26, 2011 at 11:03 PM, Eoin
More informationSEO For Security Guard Companies
startasecuritycompany.com SEO For Security Guard Companies How We Built Two Multi-Million Dollar Security Companies Using Search Engine Optimization Contents 1. Thanks For Downloading! Congratulations!
More informationSkills Academy. Forensic Studies Courses
Skills Academy Forensic Studies Courses www.skillsacademy.co.za Forensic Science Programmes Forensic Science Studies is for the person who wants to work in a laboratory or as a crime scene technician and
More informationENCRYPTION IN USE FACT AND FICTION. White Paper
White Paper Table of Contents The Case for Encryption... Encryption in Use Not Some Kind of Magic... Evaluating Encryption in Use Claims... 3 4 4 The Vaultive Approach... 5 2 Risk-conscious enterprises
More informationCertificate-based authentication for data security
Technical white paper Certificate-based authentication for data security Table of Contents Introduction... 2 Analogy: A simple checking account... 2 Verifying a digital certificate... 2 Summary... 8 Important
More informationUnion Bank s NMLS REGISTRATION GUIDE. PREVIOUSLY REGISTERED Mortgage Loan Originator (MLO)
Union Bank s NMLS REGISTRATION GUIDE PREVIOUSLY REGISTERED Mortgage Loan Originator (MLO) Revised 4/17/2012 Table of Contents 1.0 S.A.F.E. ACT... 3 1.1 Background... 3 1.2 Registration Overview for s...
More informationWritten Testimony of Rick Gonzales Senior Vice President and Chief Operating Officer New York Independent System Operator
Assembly Standing Committee on Energy Kevin A. Cahill, Chairman Assembly Standing Committee on Corporations, Authorities and Commissions James F. Brennan, Chairman Assembly Standing Committee on Cities
More informationTHE CYBERSECURITY LITERACY CONFIDENCE GAP
CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks
More informationCybersecurity and Hospitals: A Board Perspective
Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security
More informationUp and Running Software The Development Process
Up and Running Software The Development Process Success Determination, Adaptative Processes, and a Baseline Approach About This Document: Thank you for requesting more information about Up and Running
More informationGSA Protocols: How and Why they are Important and Relevant to
GSA Protocols: How and Why they are Important and Relevant to Lotteries and Lottery Operations By Marc McDermott, Technical Director, Gaming Standards Association (GSA) As posted at PGRI - Public Gaming
More informationIt s an informational or training session you watch on your computer.
Want to Have a Webinar? Here s How to Get Started! A Guide for Legislative Staff What exactly is a webinar anyway? It s an informational or training session you watch on your computer. Webinars provide
More informationMODEL COMPLAINTS SYSTEM AND POLICY THE OMBUDSMAN'S GUIDE TO DEVELOPING A COMPLAINT HANDLING SYSTEM
MODEL COMPLAINTS SYSTEM AND POLICY THE OMBUDSMAN'S GUIDE TO DEVELOPING A COMPLAINT HANDLING SYSTEM Published by the Office of the Ombudsman 18 Lower Leeson Street Dublin 2 Telephone: 01 639 5600 Lo-call:
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationFinancial Statements Using Crystal Reports
Sessions 6-7 & 6-8 Friday, October 13, 2017 8:30 am 1:00 pm Room 616B Sessions 6-7 & 6-8 Financial Statements Using Crystal Reports Presented By: David Hardy Progressive Reports Original Author(s): David
More informationKansas City s Metropolitan Emergency Information System (MEIS)
Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)
More informationINCIDENT-BASED CRIME REPORTING
INCIDENT-BASED CRIME REPORTING NCS-X and NIBRS Program Planning Bureau of Justice Statistics Federal Bureau of Investigation IACP/SEARCH/RTI/IJIS/PERF 1 AGENDA Overview of the NCS-X Program Overview of
More informationIntegrating Complex Regional Information Sharing Programs
Integrating Complex Regional Information Sharing Programs in the National Capital Region Dave Russell Fairfax County, VA Police 1 st Sgt Ross Randlett Prince William County, VA Police Captain Mitch Cunningham
More informationThe role of municipal government in preventing crime and building community safety
NATIONAL MUNICIPAL NETWORK ON CRIME PREVENTION Background and Reference Document Overview The National Municipal Network on Crime Prevention brings together Canadian municipalities from across the country
More informationCertification. Forensic Certification Management Board. Robert J. Garrett, Director
Certification Forensic Certification Management Board Robert J. Garrett, Director Crime Lab Accreditation and Certification Essentials National Clearinghouse for Science, Technology, and the Law What is
More informationIdentity Theft Victim s Complaint and Affidavit
Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors
More information2016 Global Identity Summit Pre-Conference Paper. Fingerprints
2016 Global Identity Summit Pre-Conference Paper Fingerprints This is a community-developed document. Information and viewpoints provided within are not necessarily the opinions of the paper coordinators
More informationBisnode View Why is it so damn hard to piece together information across the enterprise?
Bisnode View Why is it so damn hard to piece together information across the enterprise? By Pär Österlund Why is it so damn hard to piece together information across the enterprise? By Pär Österlund Creating
More informationReview of the Canadian Anti-Spam Legislation
Review of the Canadian Anti-Spam Legislation Rogers Communications Brief October 17, 2017 1 Rogers Communications Deborah Evans 350 Bloor Street East Toronto, Ontario M4W 0A1 RCI.Regulatory@rci.rogers.com
More informationCHAIR AND MEMBERS CIVIC WORKS COMMITTEE MEETING ON NOVEMBER 29, 2016
TO: FROM: SUBJECT: CHAIR AND MEMBERS CIVIC WORKS COMMITTEE MEETING ON NOVEMBER 29, 2016 KELLY SCHERR, P.ENG., MBA, FEC MANAGING DIRECTOR ENVIRONMENTAL & ENGINEERING SERVICES AND CITY ENGINEER SHIFT RAPID
More informationPRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement
CHESTER COUNTY DISTRICT ATTORNEY S OFFICE TELEPHONE: 610-344-6801 FAX: 610-344-5905 THOMAS P. HOGAN DISTRICT ATTORNEY 201 W. MARKET STREET, SUITE 4450 POST OFFICE BOX 2748 WEST CHESTER, PA 19380-0991 March
More informationSwedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation
Think Cloud Compliance Case Study Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Customer details : Collector Bank - Sweden 329 employees www.collector.se/en Banking
More informationNORTH CAROLINA STATE CRIME LABORATORY FY2015/2016 Annual Report
NORTH CAROLINA STATE CRIME LABORATORY FY2015/2016 Annual Report Justice and Public Safety Appropriations Committees Thursday, March 23, 2017 Raleigh, NC 1 Agenda Quality & Transparency Case Submissions
More informationAdd Your Product to Clickbank
MODULE 3 LESSON 8 Add Your Product to Clickbank 2013 Mark Bishop NicheSynergy.com 1 Niche Synergy Table of Contents Disclaimer... 2 Why use Clickbank instead of another platform?... 3 The most important
More informationAccountable Care Organizations: Testing Their Impact
Accountable Care Organizations: Testing Their Impact Eligibility Criteria * * Indicates required Preference will be given to applicants that are public agencies or are tax-exempt under Section 501(c)(3)
More informationPage 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax
1. PURPOSE The Loss Prevention Foundation, ( the foundation, LPF, the examiner ) makes high-stakes retail loss prevention certification Exams publicly available for the purpose of earning certification
More informationCERTIFICATE IN LUXEMBOURG COMPANY SECRETARIAL & GOVERNANCE PRACTICE
CERTIFICATE IN LUXEMBOURG COMPANY SECRETARIAL & GOVERNANCE PRACTICE POLICY ILA asbl 19, rue de Bitbourg L-1273 Luxembourg TABLE OF CONTENTS Program Entry 3 Eligibility criteria 3 Training program 4 Application
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Auditor www.pecb.com The objective of the Certified ISO 22000 Lead Auditor examination is to ensure that the candidate has
More informationKey questions to ask before commissioning any web designer to build your website.
Key questions to ask before commissioning any web designer to build your website. KEY QUESTIONS TO ASK Before commissioning a web designer to build your website. As both an entrepreneur and business owner,
More informationCERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement
CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement Welcome to Certified Mail Envelopes and Certified Mail Labels web sites (the Site ) a website, trademark and business name owned and operated
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified Management System Auditor www.pecb.com The objective of the PECB Certified Management System Auditor examination is to ensure that the candidates
More informationB2SAFE metadata management
B2SAFE metadata management version 1.2 by Claudio Cacciari, Robert Verkerk, Adil Hasan, Elena Erastova Introduction The B2SAFE service provides a set of functions for long term bit stream data preservation:
More informationThe Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan
Perspective on Digital Transformation in Government with Her Excellency Dr. Rauda Al Saadi, Director General, Abu Dhabi Smart Solutions and Services Authority By Michael J. Keegan Today s digital economy
More informationMedia-Ready Network Transcript
Media-Ready Network Transcript Hello and welcome to this Cisco on Cisco Seminar. I m Bob Scarbrough, Cisco IT manager on the Cisco on Cisco team. With me today are Sheila Jordan, Vice President of the
More informationCYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME
FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List
More informationIntroduction to Access 97/2000
Introduction to Access 97/2000 PowerPoint Presentation Notes Slide 1 Introduction to Databases (Title Slide) Slide 2 Workshop Ground Rules Slide 3 Objectives Here are our objectives for the day. By the
More informationTaking Mobile Banking Corporate
Universal Banking Solution System Integration Consulting Business Process Outsourcing It s ironic that in a world that has gone mobile, corporate treasurers and CFOs are still tethered to their desks because
More informationOracle Applications Cloud User Experience Strategy & Roadmap
Oracle Applications Cloud User Experience Strategy & Roadmap By Jeremy Ashley, Group Vice President Oracle Applications User Experience Copyright 2017 Oracle Corporation. All Rights Reserved. Statement
More informationDocument, presentation and spreadsheet applications To support your business objectives. Why IBM Lotus Symphony? Why free?
Document, presentation and spreadsheet applications To support your business objectives Why IBM Lotus Symphony? Why free? 2 Follow your IT budget follow the numbers Let s face it, in most organizations,
More informationFundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL
Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day
More informationIntroducing the Employment Law Exams
A webinar presented by the Office of the Registrar Introducing the Employment Law Exams for the CHRP and the CHRL July 18, 2016 1. If you wrote the CKE1 this past June and passed, are you required to write
More informationMyths about Links, Links and More Links:
Myths about Links, Links and More Links: CedarValleyGroup.com Myth 1: You have to pay to be submitted to Google search engine. Well let me explode that one myth. When your website is first launched Google
More informationNALA Certifying Board Announces New Exam Specifications Effective with 2018 Administrations
NALA Certifying Board Announces New Exam Specifications Effective with 2018 Administrations Background The NALA Certifying Board provides oversight for the development and ongoing maintenance of the Certified
More informationIntelligence-Led Policing. Executive Summary
Intelligence-Led Policing Executive Summary Five Trends to Help You See Ahead & Create Safer Communities Chicago debuted the first police call boxes in 1877, allowing citizens and police to report threats
More informationONLINE REGISTRATION: A STEP-BY-STEP GUIDE
ONLINE REGISTRATION: A STEP-BY-STEP GUIDE We encourage all of our Walkers to register online at diabetes.org/stepout. It s quick. It s easy. And, you ll have the opportunity to take advantage of our online
More information(Refer Slide Time: 00:01:30)
Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology, Madras Lecture - 32 Design using Programmable Logic Devices (Refer Slide Time: 00:01:30)
More information