STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

Size: px
Start display at page:

Download "STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY"

Transcription

1 STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION POR Level 3 Offender Information Search Service (PORLevel3) Published On: 10/20/2009 Service Release Version#: 0.7 Prepared By: Bureau of Criminal Apprehension Criminal Justice Information Systems 1430 Maryland Avenue East St. Paul, Minnesota Service Description Consumers of Service Service Inputs Service Outputs SERVICE SUMMARY Provide Justice Partners with data from POR for level 3 registrants. Justice Partners such as The Minnesota Department of Corrections (DOC) Minnesota OID (Offender Identifier as assigned by the Department of Corrections) A response containing the person and current and historical address and vehicle information.

2 Table of Contents SERVICE SUMMARY... 1 BUSINESS OUTCOME... 3 STATEMENT... 3 DRIVERS... 3 POLICIES... 3 STATUTES... 3 OBJECTIVES... 3 SCENARIOS... 3 BUSINESS SERVICE DEFINITION... 3 SERVICE OVERVIEW... 3 INPUT DETAIL AND BUSINESS VALIDATION RULES... 3 SERVICE CONSUMERS AND ACCESS RIGHTS... 4 SERVICE-LEVEL EXPECTATIONS... 4 SERVICE LOGGING AND AUDITING REQUIREMENTS... 4 TRAINING... 4 CONTACT INFORMATION... 5 TECHNICAL SERVICE DEFINITION... 6 ACCESSING THE SERVICE... 6 PRE-CONDITIONS (TECHNICAL)... 6 POST-CONDITIONS (TECHNICAL)... 6 SERVICE INTERFACE... 6 MESSAGE FORMAT... 6 EXCEPTION CONDITIONS AND ERROR HANDLING... 6 MCJE SECURITY PROFILE... 7 APPENDIX A: GLOSSARY... 8 APPENDIX D: TEMPLATE REVISION HISTORY Page 2 of 11

3 Business Outcome Statement Provide Justice Partners with the current person, current and historical address, and vehicle data from POR for level 3 registrants (compliant, absent or non-compliant) for a given Offender Identifier as assigned by the Minnesota Department of Corrections. Drivers Department of Corrections (DOC) requested a way to get POR s data concerning level 3 offenders to enhance their investigation capability. The PORLevel3 Search Service will be designed to meet the requirements of DOC while also being useable by other Justice Partners. Policies POR data is generally private but we cooperate with Justice Partners such as law enforcement, probation and corrections to provide data for their needs in managing offender registration and community notification. Statutes M.S and M.S Objectives Provide MCJE-compliant document of person, address and vehicle data including both current and historical address and vehicle information. Scenarios The following is a list of potential ways in which the Business Outcome of this service will be used: Justice Partners can use the service to gather information on POR level 3 registrants (compliant, absent or non-compliant). Business Service Definition Service Overview Provide Justice Partners with the current person, current and historical address, and vehicle data from POR for level 3 registrants (compliant, absent or non-compliant) for a given Offender Identifier as assigned by the Minnesota Department of Corrections. Input Detail and Business Validation Rules MN OID (a 6-digit number as assigned by the Minnesota Department of Corrections) is provided. If the OID is in the POR database and is for a level 3 registrant (compliant, absent or noncompliant), the MCJE XML document is returned. If a registrant is on POR but is not a level 3 risk Page 3 of 11

4 level, the message Not Level 3 will be returned. If the OID is not on POR, the message No record found will be returned. Service Consumers and Access Rights Authorized Justice Partners will have rights to execute this service. Service-Level Expectations Support On call support for this service is available Monday through Friday, 8:00 a.m. to 4:30 p.m., except state holidays, through the BCA Service desk at telephone number: or Service Availability This service is designed to operate 24 hours a day, 7 days a week, 365 days a year. Though this service is intended to operate 24/7/365, the BCA s technical support of this service is limited to what has been identified in the Support section above. External Service Dependencies None. Known Maintenance Interruptions None. Service Downtime Notification Notification of downtime will be provided in keeping with standard BCA practices. Expected Response Times None. Service Logging and Auditing Requirements Training The BCA MNJIS Training and Auditing team is required to manually audit for proper access and use of data from POR. Statewide Supervision staff manually audits for proper access and use of data from the Statewide Supervision System. Note: Responses from the BCA contain confidential data. Agency staff, including employees and contractors, that can access logs containing confidential data provided by BCA services must be fingerprinted and have a criminal background check performed. An individual must pass the background check before access to service logs is allowed. The consuming agency/department is responsible for training their individual users on appropriate use, dissemination, and security requirements related to the use of this service and the content returned. Page 4 of 11

5 Contact Information BCA Service Desk (651) or (888) Page 5 of 11

6 Technical Service Definition Accessing the Service Accessing the PORLevel3 Search Service is restricted to systems on the CJDN network that have access to the BCA s ESB. The PORLevel3 Search Service interface is not discoverable. To request access to the PORLevel3 Search Service, send an to bca.servicedesk@state.mn.us with the subject MNJIS PORLevel3 Services Access Request. Pre-Conditions (Technical) MCJE compliant request Request is valid. Request contains a valid instance of the BCA Header. Post-Conditions (Technical) This is a read only service; therefore the service will not change the state or data. The request and response from the MNJIS PORLevel3 Services consumer will be archived. BCA compliant ResponseMessage for all valid requests. SOAP Fault for all errors. MCJE compliant response Service Interface Provide Justice Partners with the current person, current and historical address, and vehicle data from POR for level 3 registrants (compliant, absent or non-compliant) for a given Offender Identifier as assigned by the Minnesota Department of Corrections. Responses to this service are synchronous. Message Format A shared repository of sample exchanges is available. These sample exchanges are meant to demonstrate several but not all possible query/response scenarios and can be used as a basis for understanding how to use the service. To request a copy of the PORLevel3 Sample Exchanges, send an to bca.servicedesk@state.mn.us with the subject MNJIS PORLevel3 Services Sample Exchanges. Exception Conditions and Error Handling The consumer should check the ResponseCategory of the ResponseMessage instance document to determine if the exchange was a successful. This element provides the type of response and includes INFORMATION, WARNING, ERROR and RESULT. If warning or information messages are provided with a result, the category will be RESULT. Page 6 of 11

7 Unhandled exceptions happen for unknown and unpredicted reasons. When an unhandled exception occurs, a SOAP Fault is returned to the client/consumer of the service. The SOAP Fault <faultstring> element will contain any known information about the unhandled exception. If the consumer s request contains improper data in the BCA Header or search request, the service XML response will contain a FailureReason that describes the error. MCJE Security Profile Access to this service is limited to criminal justice agencies that are connected to the State of Minnesota Criminal Justice Data Network (CJDN). Workstations and servers that access the service must be granted access by IP address through the BCA s firewall in order to reach the servers where the service is running. The IP addresses of all computers directly accessing the service must be provided to the BCA so that firewall rules can be created. This service operates over HTTPS on TCP/IP port 443. An SSL certificate is required to be installed on any workstation or server consuming the service. SSL certificates can be obtained from the BCA. When configuring the endpoint in a consuming client or service, make sure that https is specified. Page 7 of 11

8 Appendix A: Glossary Term Public Service Restricted Service Private Service OID Definition A service that it is available for anyone to consume. This includes anyone with access to a computer and the world wide web. A service that can only be consumed after authorization and configuration by the BCA. A service that is only available internal to the BCA. That is, can only be consumed by other BCA services. Offender Identifier as assigned by the Minnesota Department of Corrections MJCE ESB Page 8 of 11

9 Page 9 of 11

10 1. Appendix C: Document Revision History Rev. Num. Rev. Date Reason Prepared by 1.0 Initial BCA MNJIS 0.1 8/26/2009 Initial draft of Business Outcome and Business Service Definition 0.2 8/26/2009 Initial draft of Technical Service Description Walt Cygan Doug Wheeler 0.3 9/04/2009 Updates per review/feedback Doug Wheeler 0.4 9/18/2009 Update to reflect the fact that getporlevel3 returns Level 3 records for both compliant and non-compliant. Doug Wheeler 0.5 9/22/ /28/2009 Proposed single point of contact PORLevel3@state.mn.us Proposed Appendix B: Client Code Examples Removed / Accepted tracked changes. PORLevel3 Service to Search noting only search, no update Incorporated feedback. Doug Wheeler Doug Wheeler Page 10 of 11

11 Appendix D: Template Revision History Rev. Num. Rev. Date Reason Prepared by 1.0 8/3/2009 Technical Service Definition updates Mark Girard Page 11 of 11

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Minnesota Motor Registration Information Service (QMV) Published On: Feb 09, 2012 Service Release Version#: 1.0 Prepared

More information

State of Minnesota Department of Public Safety Bureau of Criminal Apprehension

State of Minnesota Department of Public Safety Bureau of Criminal Apprehension State of Minnesota Department of Public Safety Bureau of Criminal Apprehension Sharing Bandwidth SERVICE SUMMARY Service Name Sharing Bandwidth Service Visibility Public Restricted Service Description

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Person Information Service (QP) Published On: September 21, 2010 Service Release Version#: 1.0 Prepared By: Bureau of

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Out-of-State Query Criminal History Record (QRN) Published On: September 21, 2010 Service Release Version#: 1.1 Prepared By:

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Motor Registration Information Service (QMR) Published On: September, 2010 Service Release Version#: 1.0 Prepared By:

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Out-of-State Driver s License, Driver s History, and Vehicle Registration Information Service Driver s License Query (DQ)

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Integrated Search Query Service Published On: 10/20/2009 Service Release Version#: 1.4 Prepared By: Bureau of Criminal Apprehension

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Person Gun Check (QPGC) Published On: August 26, 2010 Service Release Version#: 1.4 Prepared By: Bureau of Criminal

More information

BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA

BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA AGENDA TOPICS Overview of MNJIS Product Managers Role and Purpose Information

More information

Defense Information System for Security (DISS) Frequently Asked Questions (FAQs)

Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Defense Manpower Data Center Personnel Security & Assurance Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Document Version 1.3 28 March 2017 Document History Version

More information

SERVICE DESCRIPTION & ADDITIONAL TERMS AND CONDITIONS VERSIEGELTE CLOUD. Service description & additional terms and conditions VERSIEGELTE CLOUD

SERVICE DESCRIPTION & ADDITIONAL TERMS AND CONDITIONS VERSIEGELTE CLOUD. Service description & additional terms and conditions VERSIEGELTE CLOUD Service description & additional terms and conditions VERSIEGELTE CLOUD Last revised: March 19, 2018 Page 1 of 10 PUBLICATION DETAILS Published by Telekom Deutschland GmbH Landgrabenweg 151 53227 Bonn

More information

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2 IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated

More information

Doc Express Roles and Access. September 2016

Doc Express Roles and Access. September 2016 Doc Express Roles and Access September 2016 Address: 5700 SW 34th Street, Suite 1235, Gainesville, Florida 32608-5371 Web: www.infotechfl.com Customer support is available by phone or email Monday through

More information

Exchange Network Node Help Desk. NOLA Conference Feb 9-10, 2004

Exchange Network Node Help Desk. NOLA Conference Feb 9-10, 2004 Exchange Network Node Help Desk NOLA Conference Feb 9-10, 2004 Outline Node Building Resources Review ECOS Node Help Desk, Docs, FAQs, DNCs Amplified Help Desk Support Procedures Getting started on your

More information

Colorado Sex Offender Management Board (SOMB) INTENT TO APPLY. as a POLYGRAPH EXAMINER. for the Adult and Juvenile Provider List

Colorado Sex Offender Management Board (SOMB) INTENT TO APPLY. as a POLYGRAPH EXAMINER. for the Adult and Juvenile Provider List Colorado Sex Offender Management Board (SOMB) INTENT TO APPLY as a POLYGRAPH EXAMINER for the Adult and Juvenile Provider List Colorado Department of Public Safety Division of Criminal Justice Office of

More information

Scope Statement for the Criminal Reporting System (CRS) Project

Scope Statement for the Criminal Reporting System (CRS) Project State of Minnesota Department of Public Safety Bureau of Criminal Apprehension Scope Statement for the Criminal Reporting System (CRS) Project Version 1.1 Submitted on January 14, 2014 Scope Statement

More information

Kansas ecitation Submission Service Service Description Document

Kansas ecitation Submission Service Service Description Document Kansas ecitation Submission Service Service Description Document v 1.0.0 July 15, 2011 Page 1 Table of Contents Document Introduction... 4 ECitation Data Submission Service Overview... 6 Purpose... 6 Scope...

More information

Standard CIP 004 3a Cyber Security Personnel and Training

Standard CIP 004 3a Cyber Security Personnel and Training A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-3a 3. Purpose: Standard CIP-004-3 requires that personnel having authorized cyber or authorized unescorted physical access

More information

Frequently Asked Questions About Getting On NCAtrak

Frequently Asked Questions About Getting On NCAtrak Frequently Asked Questions About Getting On NCAtrak Frequently Asked Questions About Getting on NCAtrak (technology reaching all kids) 1. What is NCAtrak? NCAtrak is a computerized, web-based case tracking

More information

OpenFox. Configurator

OpenFox. Configurator OpenFox Configurator Product Guide 2018 OpenFox Configurator Ever-changing technology and demands for information at a faster pace poses the challenge of ensuring your system is flexible and able to adapt

More information

CHANGE CONTROL FORM. ORIGINATOR'S NAME: Lou Leffer DATE: 08 September 2000 CHANGE REQUEST SUMMARY: Study Mode, Flow-Based CHANGE REVISION: 1.

CHANGE CONTROL FORM. ORIGINATOR'S NAME: Lou Leffer DATE: 08 September 2000 CHANGE REQUEST SUMMARY: Study Mode, Flow-Based CHANGE REVISION: 1. CHANGE CONTROL FORM ORIGINATOR'S NAME: Lou Leffer DATE: 08 September 2000 CHANGE REQUEST SUMMARY: Study Mode, Flow-Based CHANGE REVISION: 1.1 CHANGE REQUEST DETAIL: The details of the Study Mode, Flow-Based

More information

TIME SYSTEM SECURITY AWARENESS HANDOUT

TIME SYSTEM SECURITY AWARENESS HANDOUT WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/16/2017 2018 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer

More information

Next Generation Identification Rap Back Services

Next Generation Identification Rap Back Services Next Generation Identification Rap Back Services Presented by: Jimmy Mills Management and Program Analyst Rap Back Services Team Theresa Yarboro Management and Program Analyst Rap Back Services Team 1

More information

The latest version of this profile can be found on the location specified in 1.3

The latest version of this profile can be found on the location specified in 1.3 FORTHcert Profile according to RFC 2350 1. About this document 1.1 Date of Last Update This is version 1, published 2012/02/1. 1.2 Distribution List for Notifications The latest version of this profile

More information

Florida s Integrated Report Exchange System (FIRES) Public Crash Portal Resource and Tutorial Guide

Florida s Integrated Report Exchange System (FIRES) Public Crash Portal Resource and Tutorial Guide Florida s Integrated Report Exchange System (FIRES) Public Crash Portal Resource and Tutorial Guide Table of Contents Overview and Types of Crashes Included Page 3 Quick Statistics.Pages 4-5 Advanced Search..Pages

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

Policies, Notices, & Instructions Minnesota Trial Court Public Access (MPA) Remote View For Use with MPA Remote on the Internet

Policies, Notices, & Instructions Minnesota Trial Court Public Access (MPA) Remote View For Use with MPA Remote on the Internet Policies, Notices, & Instructions Minnesota Trial Court Public Access (MPA) Remote View For Use with MPA Remote on the Internet Copyright 2007, 2008 by the State of Minnesota, State Court Administrator's

More information

PKI Disclosure Statement Digidentity Certificates

PKI Disclosure Statement Digidentity Certificates PKI Disclosure Statement Digidentity Certificates Title PKI Disclosure Statement Digidentity Certificates Date 25 March 2019 Author Digidentity Version 2019-v1 Classification Public Digidentity 2019 Revisions

More information

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign This document is scheduled to be published in the Federal Register on 11/29/2016 and available online at https://federalregister.gov/d/2016-28627, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE

More information

Texas Department of Family and Protective Services

Texas Department of Family and Protective Services Texas Department of Family and Protective Services Automated Background Check System (ABCS) User Guide Updated November 2016 Table of Contents DFPS AUTOMATED BACKGROUND CHECK SYSTEM (ABCS) USER MANUAL

More information

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard Kiosk Security Standard 1. Purpose This standard was created to set minimum requirements for generally shared devices that need to be easily accessible for faculty, staff, students, and the general public,

More information

You ve been breached: Now What? Minnesota s Data Breach Preparation and Notification for Electronic Data

You ve been breached: Now What? Minnesota s Data Breach Preparation and Notification for Electronic Data You ve been breached: Now What? Minnesota s Data Breach Preparation and Notification for Electronic Data Enterprise IT Management Initiative State of Minnesota Jenna Covey, jenna.covey@state.mn.us, 651-201-1199

More information

Victim Assistance & Restorative Justice Program s Registrant/Victim Input at Offender Intake Form

Victim Assistance & Restorative Justice Program s Registrant/Victim Input at Offender Intake Form Victim Assistance & Restorative Justice Program s Registrant/Victim Input at Offender Intake Form The Minnesota Department of Corrections goal is to promote safety in the lives of victims and others who

More information

Monthly Performance Metrics. December 2018

Monthly Performance Metrics. December 2018 Department of Technology Monthly Performance Metrics December 2018 Compliance Level Legend In Compliance Out of Compliance Within Tolerance Insufficient Data SERVICE AVAILABILITY Target Performance Actual

More information

Unofficial English translation offered by EuropElectro, for reference only

Unofficial English translation offered by EuropElectro, for reference only Ref. No. CNCA-00C-007 DETAILED IMPLEMENTATION RULES FOR COMPULSORY PRODUCTS CERTIFICATION Submission, Dissemination and Publication of Information Issued on Jan. 8, 2014 Implemented on Jan. 8, 2014 Published

More information

New York State Integrated Justice Information Exchange Project. NGA GJXDM Policy Academy April 18-20, 2006

New York State Integrated Justice Information Exchange Project. NGA GJXDM Policy Academy April 18-20, 2006 New York State Integrated Justice Information Exchange Project NGA GJXDM Policy Academy April 18-20, 2006 NYS Team Representatives at 2006 Policy Academy Name Title Agency Marlaine Hoffman Deputy Director

More information

Security Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015

Security Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015 U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Security Control Mapping of CJIS Security Policy Version 5.3 s to NIST Special Publication 800-53

More information

Information Security Incident Response and Reporting

Information Security Incident Response and Reporting Information Security Incident Response and Reporting Original Implementation: July 24, 2018 Last Revision: None This policy governs the actions required for reporting or responding to information security

More information

Appendix. In the Appendix: Online Help GRITS Help Desk

Appendix. In the Appendix: Online Help GRITS Help Desk Appendix In the Appendix: Online Help GRITS Help Desk Online Help GRITS online help function provides you with both screen-specific help and a general help index. You may access online help from any screen

More information

Access to University Data Policy

Access to University Data Policy UNIVERSITY OF OKLAHOMA Health Sciences Center Information Technology Security Policy Access to University Data Policy 1. Purpose This policy defines roles and responsibilities for protecting OUHSC s non-public

More information

Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011

Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Presentation Topics Current and Future HIJIS Activities Background HIJIS Strategic Plan HIJIS Architecture Joins

More information

Therapy Provider Portal. User Guide

Therapy Provider Portal. User Guide Therapy Provider Portal User Guide Page 2 of 16 UCare User Guide V1.7 Table of Contents I. Introduction...3 About HSM Therapy Management... 4 Terms of Use... 4 Contact Information... 6 II. Using the Therapy

More information

ICT User Access Security Standard Operating Procedure

ICT User Access Security Standard Operating Procedure ICT User Access Security Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised

More information

FRC HUB OPERATIONAL TERMS AND CONDITIONS

FRC HUB OPERATIONAL TERMS AND CONDITIONS FRC HUB OPERATIONAL TERMS AND CONDITIONS PREPARED BY: DOCUMENT REF: 308009 VERSION: 56.0 DATE: FINALDRAFT : MARKET PERFORMANCE TBA 1. RECITALS Definitions Recitals Subscriber means any business that sends

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information

Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives

Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives Arkansas Department of Health Prescription Monitoring Program March 2016 Contents Contents 1 Document Overview...

More information

Access Control Policy

Access Control Policy Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,

More information

# B: Key Code Security Rules and Information on GM KeyCode Look-Up Application - (Jan 9, 2009)

# B: Key Code Security Rules and Information on GM KeyCode Look-Up Application - (Jan 9, 2009) Page 1 of 11 Document ID: 2221721 #06-00-89-051B: Key Code Security Rules and Information on GM KeyCode Look-Up Application - (Jan 9, 2009) Subject: Key Code Security Rules and Information on GM KeyCode

More information

Electronic Authentication Steps for Accessing EvaluationWeb

Electronic Authentication Steps for Accessing EvaluationWeb Electronic Authentication Steps for Accessing EvaluationWeb Before EvaluationWeb access is granted, all persons requesting access must be e-authenticated (identity proofed) via the CDC s Secure Access

More information

Florida. Increase Usage

Florida. Increase Usage Florida Law enforcement officials, victim advocates and crime victims alike offer high marks for the nation s leading automated victim notification solution. Known in most states as VINE (Victim Information

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program

More information

Comprehensive Case Information System (CCIS) 2017 Regional Training Workshops

Comprehensive Case Information System (CCIS) 2017 Regional Training Workshops Comprehensive Case Information System (CCIS) 2017 Regional Training Workshops CCIS Background CCIS Comprehensive Case Information System Statewide Court Case Data and Records Florida Statute - 28.24(12)(e)

More information

Security and Patient Privacy Handling Key features & responsibilities

Security and Patient Privacy Handling Key features & responsibilities Trusted information systems for health professionals The integrated solution for the electronic management of clinical trials From the design of the electronic Case Report Forms to database lock Security

More information

Laws of 2012, Chapter 277, Article I, Section 88 Records Management; Legislative Report

Laws of 2012, Chapter 277, Article I, Section 88 Records Management; Legislative Report This document is made available electronically by the Minnesota Legislative Reference Library as part of an ongoing digital archiving project. http://www.leg.state.mn.us/lrl/lrl.asp Laws of 2012, Chapter

More information

Standard CIP 005 2a Cyber Security Electronic Security Perimeter(s)

Standard CIP 005 2a Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2a 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)

More information

2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY

2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY 2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY The New Jersey Office of Homeland Security and Preparedness () offers internships to a select group of applicants. These are part-time, unpaid internships for

More information

FBI Criminal History Record Certification Program

FBI Criminal History Record Certification Program FBI Criminal History Record Certification Program P. David Morgan Fingerprint Examiner Instructor Federal Bureau of Investigation Criminal Justice Information Services Division Biometric Services Section

More information

INCIDENT-BASED CRIME REPORTING

INCIDENT-BASED CRIME REPORTING INCIDENT-BASED CRIME REPORTING NCS-X and NIBRS Program Planning Bureau of Justice Statistics Federal Bureau of Investigation IACP/SEARCH/RTI/IJIS/PERF 1 AGENDA Overview of the NCS-X Program Overview of

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Dymoke Law Office, P.A. 300 Riverside Avenue NW Melrose, Minnesota Telephone (320) Fax (320)

Dymoke Law Office, P.A. 300 Riverside Avenue NW Melrose, Minnesota Telephone (320) Fax (320) Dymoke Law Office, P.A. 300 Riverside Avenue NW Melrose, Minnesota 56352 Telephone (320) 256-4205 Fax (320) 256-7201 February 21, 2017 Adrianna Hennen City of Freeport 125 Main Street East BY ELECTRONIC

More information

Federal Bureau of Investigation CJIS Division Next Generation Identification

Federal Bureau of Investigation CJIS Division Next Generation Identification Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

Enterprise Guest Access

Enterprise Guest Access Data Sheet Published Date July 2015 Service Overview Whether large or small, companies have guests. Guests can be virtually anyone who conducts business with the company but is not an employee. Many of

More information

Tesco Bank Click2Park - User Guide

Tesco Bank Click2Park - User Guide Table of Contents 1. Introduction 1.0 Overview of Car Share, Blue Badge Permits & HotSpaces 1.1 Registering with Click2Park 1.2 Logging On to Click2Park 2. Getting to Know Click2Park 2.1 Space Types 2.2

More information

Postal Inspection Service Mail Covers Program

Postal Inspection Service Mail Covers Program Postal Inspection Service Mail Covers Program May 28, 2014 AUDIT REPORT Report Number HIGHLIGHTS BACKGROUND: In fiscal year 2013, the U.S. Postal Inspection Service processed about 49,000 mail covers.

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

[DATA SYSTEM]: Privacy and Security October 2013

[DATA SYSTEM]: Privacy and Security October 2013 Data Storage, Privacy, and Security [DATA SYSTEM]: Privacy and Security October 2013 Following is a description of the technical and physical safeguards [data system operator] uses to protect the privacy

More information

CA IdentityMinder. Glossary

CA IdentityMinder. Glossary CA IdentityMinder Glossary 12.6.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

Agency Registration and Broker Certification

Agency Registration and Broker Certification Contents Agency Registration and Broker Certification... 1 Broker Certification Steps... 3 Agency Registration and Certification Step by Step... 3 Agency Registration... 4 Agency Roles... 4 Agency Registration

More information

Commonwealth of Pennsylvania - Justice Network

Commonwealth of Pennsylvania - Justice Network Commonwealth of Pennsylvania - Justice Network Published: June 1999 FIORANO CUSTOMER SOLUTION Commonwealth of Pennsylvania uses Fiorano s solution to enhance public safety in the State by enabling Real

More information

Substitute Quick Reference (SmartFindExpress Substitute Calling System and Web Center)

Substitute Quick Reference (SmartFindExpress Substitute Calling System and Web Center) Substitute Quick Reference (SmartFindExpress Substitute Calling System and Web Center) System Phone Number 578-6618 Help Desk Phone Number 631-4868 (6:00 a.m. 4:30 p.m.) Write your Access number here Write

More information

NC Department of Justice

NC Department of Justice Information Technology Division (ITD) Presented to: House Appropriations Subcommittee for Information Technology Scott Glawson CIO NC Department of Justice 05/09/2013 ITD Organizational Structure 73 IT

More information

Security and Fleet Manager

Security and Fleet Manager Security and Fleet Manager Location: [Europe & the Middle East] [Jordan] Town/City: Amman Category: Security Job Type: Open-ended, Full-time Position Title: Security and Fleet Manager PURPOSE OF POSITION:

More information

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017 Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,

More information

Participant User Guide, Version 2.6

Participant User Guide, Version 2.6 Developers Integration Lab (DIL) Participant User Guide, Version 2.6 3/17/2013 REVISION HISTORY Author Date Description of Change 0.1 Laura Edens Mario Hyland 9/19/2011 Initial Release 1.0 Michael Brown

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

RFQ OIT-1 Q&A. Questions and Answers, in the order received.

RFQ OIT-1 Q&A. Questions and Answers, in the order received. Question Does the system have an existing SSP? Do they use a system like Xacta or CSAM to generate the SSP. Will they provide us the current POAM list? Will they provide scanning tools or we have to bring

More information

Data Protection Policy

Data Protection Policy Introduction In order to; provide education, training, assessment and qualifications to its customers and clients, promote its services, maintain its own accounts and records and support and manage its

More information

Please contact the Justice Center at with any questions.

Please contact the Justice Center at with any questions. TO: FROM: Executive Directors, Voluntary Providers DDSOO and DDRO Directors Provider Association Megan O Connor-Hebert, Deputy Commissioner Division of Quality Improvement DATE: August 19, 2013 SUBJECT:

More information

SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004

SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 This document provides an overview of the program put into place by the South Carolina Law Enforcement Division (SLED)

More information

Technical Communications Systems Overview JLR WEB

Technical Communications Systems Overview JLR WEB Jaguar Land Rover elearning TC-JLR-WEB: Technical Communications Systems Overview JLR WEB Contents Overview 3 Document Details 9 Posting and Notification 13 Electronic Product Quality Reporting (EPQR)

More information

Comprehensive Case Information System (CCIS) August 22, 2017

Comprehensive Case Information System (CCIS) August 22, 2017 Comprehensive Case Information System (CCIS) August 22, 2017 CCIS Background CCIS Comprehensive Case Information System Statewide Court Case Data and Records Florida Statute - 28.24(12)(e) Provides controlled

More information

Standard CIP 005 4a Cyber Security Electronic Security Perimeter(s)

Standard CIP 005 4a Cyber Security Electronic Security Perimeter(s) A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-4a 3. Purpose: Standard CIP-005-4a requires the identification and protection of the Electronic Security Perimeter(s)

More information

Training Guide for Practitioners. Washington State Department of Health Washington State Prescription Monitoring Program

Training Guide for Practitioners. Washington State Department of Health Washington State Prescription Monitoring Program Training Guide for Practitioners Washington State Department of Health Washington State Prescription Monitoring Program April 2017 Training Guide for Practitioners Contents Contents 1 Document Overview...

More information

INFORMED VISIBILITY. Mail Tracking & Reporting Actions for Transitioning to a Secure Transfer Method

INFORMED VISIBILITY. Mail Tracking & Reporting Actions for Transitioning to a Secure Transfer Method INFORMED VISIBILITY Mail Tracking & Reporting Actions for Transitioning to a Secure Transfer Method January 16, 2018 Discontinued Support for Non-Secure FTP After January 31, 2018, Informed Visibility

More information

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE Information Technology Services Administrative Regulation ITS-AR-1506 INFORMATION SECURITY-SECURITY INCIDENT RESPONSE 1.0 Purpose and Scope The purpose of the Security Response Administrative Regulation

More information

Judiciary Judicial Information Systems

Judiciary Judicial Information Systems Audit Report Judiciary Judicial Information Systems August 2016 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY For further information concerning this report

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Tax Year 2010 Maryland Combined Corporate Reporting System Handbook

Tax Year 2010 Maryland Combined Corporate Reporting System Handbook Tax Year 2010 Maryland Combined Corporate Reporting System Handbook for corporations/software developers who file a proforma via the Combined Corporate Reporting System March 2011 Bureau of Revenue Estimates

More information

HIDTA s Overdose Detection Mapping Application Program ODMAP ODMAP ODMAP free-of-charge

HIDTA s Overdose Detection Mapping Application Program ODMAP ODMAP ODMAP free-of-charge ODMAP HIDTA s Overdose Detection Mapping Application Program ODMAP, assists public health, fire, emergency medical service and law enforcement agencies track known and suspected overdose incidents. ODMAP

More information

e180 Privacy Policy July 2018

e180 Privacy Policy July 2018 e180 Privacy Policy July 2018 We are e180, the creators of Braindate. We care deeply about protecting your personal information, so we ve outlined everything you need to know about it here. Last modified:

More information

Substitute Quick Reference Card

Substitute Quick Reference Card Substitute Quick Reference Card System Phone Number 240-439-6900 Help Desk Phone Number 301-644-5120 ID PIN System Calling Times Week Day Today s Jobs Future Jobs Weekdays Starts at 6:00 a.m. 5:00 p.m.

More information

WhatsConfigured for WhatsUp Gold 2016 User Guide

WhatsConfigured for WhatsUp Gold 2016 User Guide WhatsConfigured for WhatsUp Gold 2016 User Guide Contents Welcome to WhatsConfigured 1 What is WhatsConfigured? 1 Finding more information and updates 1 Sending feedback 2 Deploying WhatsConfigured 3 STEP

More information

Privacy Policy Effective May 25 th 2018

Privacy Policy Effective May 25 th 2018 Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand

More information

Instructions for New Markets Tax Credit Program Applicants in Electronic Handbooks

Instructions for New Markets Tax Credit Program Applicants in Electronic Handbooks Instructions for New Markets Tax Credit Program Applicants in Electronic Handbooks General Instructions for All NMTC Applicants: Required Software Internet Explorer 5.5 or Netscape Navigator 6.0 (ensure

More information

ForeScout CounterACT. Configuration Guide. Version 5.0

ForeScout CounterACT. Configuration Guide. Version 5.0 ForeScout CounterACT Core Extensions Module: Reports Plugin Version 5.0 Table of Contents About the Reports Plugin... 3 Requirements... 3 Supported Browsers... 3 Verify That the Plugin Is Running... 5

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information