STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY
|
|
- Jared Jackson
- 6 years ago
- Views:
Transcription
1 STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION POR Level 3 Offender Information Search Service (PORLevel3) Published On: 10/20/2009 Service Release Version#: 0.7 Prepared By: Bureau of Criminal Apprehension Criminal Justice Information Systems 1430 Maryland Avenue East St. Paul, Minnesota Service Description Consumers of Service Service Inputs Service Outputs SERVICE SUMMARY Provide Justice Partners with data from POR for level 3 registrants. Justice Partners such as The Minnesota Department of Corrections (DOC) Minnesota OID (Offender Identifier as assigned by the Department of Corrections) A response containing the person and current and historical address and vehicle information.
2 Table of Contents SERVICE SUMMARY... 1 BUSINESS OUTCOME... 3 STATEMENT... 3 DRIVERS... 3 POLICIES... 3 STATUTES... 3 OBJECTIVES... 3 SCENARIOS... 3 BUSINESS SERVICE DEFINITION... 3 SERVICE OVERVIEW... 3 INPUT DETAIL AND BUSINESS VALIDATION RULES... 3 SERVICE CONSUMERS AND ACCESS RIGHTS... 4 SERVICE-LEVEL EXPECTATIONS... 4 SERVICE LOGGING AND AUDITING REQUIREMENTS... 4 TRAINING... 4 CONTACT INFORMATION... 5 TECHNICAL SERVICE DEFINITION... 6 ACCESSING THE SERVICE... 6 PRE-CONDITIONS (TECHNICAL)... 6 POST-CONDITIONS (TECHNICAL)... 6 SERVICE INTERFACE... 6 MESSAGE FORMAT... 6 EXCEPTION CONDITIONS AND ERROR HANDLING... 6 MCJE SECURITY PROFILE... 7 APPENDIX A: GLOSSARY... 8 APPENDIX D: TEMPLATE REVISION HISTORY Page 2 of 11
3 Business Outcome Statement Provide Justice Partners with the current person, current and historical address, and vehicle data from POR for level 3 registrants (compliant, absent or non-compliant) for a given Offender Identifier as assigned by the Minnesota Department of Corrections. Drivers Department of Corrections (DOC) requested a way to get POR s data concerning level 3 offenders to enhance their investigation capability. The PORLevel3 Search Service will be designed to meet the requirements of DOC while also being useable by other Justice Partners. Policies POR data is generally private but we cooperate with Justice Partners such as law enforcement, probation and corrections to provide data for their needs in managing offender registration and community notification. Statutes M.S and M.S Objectives Provide MCJE-compliant document of person, address and vehicle data including both current and historical address and vehicle information. Scenarios The following is a list of potential ways in which the Business Outcome of this service will be used: Justice Partners can use the service to gather information on POR level 3 registrants (compliant, absent or non-compliant). Business Service Definition Service Overview Provide Justice Partners with the current person, current and historical address, and vehicle data from POR for level 3 registrants (compliant, absent or non-compliant) for a given Offender Identifier as assigned by the Minnesota Department of Corrections. Input Detail and Business Validation Rules MN OID (a 6-digit number as assigned by the Minnesota Department of Corrections) is provided. If the OID is in the POR database and is for a level 3 registrant (compliant, absent or noncompliant), the MCJE XML document is returned. If a registrant is on POR but is not a level 3 risk Page 3 of 11
4 level, the message Not Level 3 will be returned. If the OID is not on POR, the message No record found will be returned. Service Consumers and Access Rights Authorized Justice Partners will have rights to execute this service. Service-Level Expectations Support On call support for this service is available Monday through Friday, 8:00 a.m. to 4:30 p.m., except state holidays, through the BCA Service desk at telephone number: or Service Availability This service is designed to operate 24 hours a day, 7 days a week, 365 days a year. Though this service is intended to operate 24/7/365, the BCA s technical support of this service is limited to what has been identified in the Support section above. External Service Dependencies None. Known Maintenance Interruptions None. Service Downtime Notification Notification of downtime will be provided in keeping with standard BCA practices. Expected Response Times None. Service Logging and Auditing Requirements Training The BCA MNJIS Training and Auditing team is required to manually audit for proper access and use of data from POR. Statewide Supervision staff manually audits for proper access and use of data from the Statewide Supervision System. Note: Responses from the BCA contain confidential data. Agency staff, including employees and contractors, that can access logs containing confidential data provided by BCA services must be fingerprinted and have a criminal background check performed. An individual must pass the background check before access to service logs is allowed. The consuming agency/department is responsible for training their individual users on appropriate use, dissemination, and security requirements related to the use of this service and the content returned. Page 4 of 11
5 Contact Information BCA Service Desk (651) or (888) Page 5 of 11
6 Technical Service Definition Accessing the Service Accessing the PORLevel3 Search Service is restricted to systems on the CJDN network that have access to the BCA s ESB. The PORLevel3 Search Service interface is not discoverable. To request access to the PORLevel3 Search Service, send an to bca.servicedesk@state.mn.us with the subject MNJIS PORLevel3 Services Access Request. Pre-Conditions (Technical) MCJE compliant request Request is valid. Request contains a valid instance of the BCA Header. Post-Conditions (Technical) This is a read only service; therefore the service will not change the state or data. The request and response from the MNJIS PORLevel3 Services consumer will be archived. BCA compliant ResponseMessage for all valid requests. SOAP Fault for all errors. MCJE compliant response Service Interface Provide Justice Partners with the current person, current and historical address, and vehicle data from POR for level 3 registrants (compliant, absent or non-compliant) for a given Offender Identifier as assigned by the Minnesota Department of Corrections. Responses to this service are synchronous. Message Format A shared repository of sample exchanges is available. These sample exchanges are meant to demonstrate several but not all possible query/response scenarios and can be used as a basis for understanding how to use the service. To request a copy of the PORLevel3 Sample Exchanges, send an to bca.servicedesk@state.mn.us with the subject MNJIS PORLevel3 Services Sample Exchanges. Exception Conditions and Error Handling The consumer should check the ResponseCategory of the ResponseMessage instance document to determine if the exchange was a successful. This element provides the type of response and includes INFORMATION, WARNING, ERROR and RESULT. If warning or information messages are provided with a result, the category will be RESULT. Page 6 of 11
7 Unhandled exceptions happen for unknown and unpredicted reasons. When an unhandled exception occurs, a SOAP Fault is returned to the client/consumer of the service. The SOAP Fault <faultstring> element will contain any known information about the unhandled exception. If the consumer s request contains improper data in the BCA Header or search request, the service XML response will contain a FailureReason that describes the error. MCJE Security Profile Access to this service is limited to criminal justice agencies that are connected to the State of Minnesota Criminal Justice Data Network (CJDN). Workstations and servers that access the service must be granted access by IP address through the BCA s firewall in order to reach the servers where the service is running. The IP addresses of all computers directly accessing the service must be provided to the BCA so that firewall rules can be created. This service operates over HTTPS on TCP/IP port 443. An SSL certificate is required to be installed on any workstation or server consuming the service. SSL certificates can be obtained from the BCA. When configuring the endpoint in a consuming client or service, make sure that https is specified. Page 7 of 11
8 Appendix A: Glossary Term Public Service Restricted Service Private Service OID Definition A service that it is available for anyone to consume. This includes anyone with access to a computer and the world wide web. A service that can only be consumed after authorization and configuration by the BCA. A service that is only available internal to the BCA. That is, can only be consumed by other BCA services. Offender Identifier as assigned by the Minnesota Department of Corrections MJCE ESB Page 8 of 11
9 Page 9 of 11
10 1. Appendix C: Document Revision History Rev. Num. Rev. Date Reason Prepared by 1.0 Initial BCA MNJIS 0.1 8/26/2009 Initial draft of Business Outcome and Business Service Definition 0.2 8/26/2009 Initial draft of Technical Service Description Walt Cygan Doug Wheeler 0.3 9/04/2009 Updates per review/feedback Doug Wheeler 0.4 9/18/2009 Update to reflect the fact that getporlevel3 returns Level 3 records for both compliant and non-compliant. Doug Wheeler 0.5 9/22/ /28/2009 Proposed single point of contact PORLevel3@state.mn.us Proposed Appendix B: Client Code Examples Removed / Accepted tracked changes. PORLevel3 Service to Search noting only search, no update Incorporated feedback. Doug Wheeler Doug Wheeler Page 10 of 11
11 Appendix D: Template Revision History Rev. Num. Rev. Date Reason Prepared by 1.0 8/3/2009 Technical Service Definition updates Mark Girard Page 11 of 11
STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY
STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Minnesota Motor Registration Information Service (QMV) Published On: Feb 09, 2012 Service Release Version#: 1.0 Prepared
More informationState of Minnesota Department of Public Safety Bureau of Criminal Apprehension
State of Minnesota Department of Public Safety Bureau of Criminal Apprehension Sharing Bandwidth SERVICE SUMMARY Service Name Sharing Bandwidth Service Visibility Public Restricted Service Description
More informationSTATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY
STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Person Information Service (QP) Published On: September 21, 2010 Service Release Version#: 1.0 Prepared By: Bureau of
More informationSTATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY
STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Out-of-State Query Criminal History Record (QRN) Published On: September 21, 2010 Service Release Version#: 1.1 Prepared By:
More informationSTATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY
STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Motor Registration Information Service (QMR) Published On: September, 2010 Service Release Version#: 1.0 Prepared By:
More informationSTATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY
STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Out-of-State Driver s License, Driver s History, and Vehicle Registration Information Service Driver s License Query (DQ)
More informationSTATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY
STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Integrated Search Query Service Published On: 10/20/2009 Service Release Version#: 1.4 Prepared By: Bureau of Criminal Apprehension
More informationSTATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY
STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Person Gun Check (QPGC) Published On: August 26, 2010 Service Release Version#: 1.4 Prepared By: Bureau of Criminal
More informationBCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA
BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA AGENDA TOPICS Overview of MNJIS Product Managers Role and Purpose Information
More informationDefense Information System for Security (DISS) Frequently Asked Questions (FAQs)
Defense Manpower Data Center Personnel Security & Assurance Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Document Version 1.3 28 March 2017 Document History Version
More informationSERVICE DESCRIPTION & ADDITIONAL TERMS AND CONDITIONS VERSIEGELTE CLOUD. Service description & additional terms and conditions VERSIEGELTE CLOUD
Service description & additional terms and conditions VERSIEGELTE CLOUD Last revised: March 19, 2018 Page 1 of 10 PUBLICATION DETAILS Published by Telekom Deutschland GmbH Landgrabenweg 151 53227 Bonn
More informationIAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2
IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated
More informationDoc Express Roles and Access. September 2016
Doc Express Roles and Access September 2016 Address: 5700 SW 34th Street, Suite 1235, Gainesville, Florida 32608-5371 Web: www.infotechfl.com Customer support is available by phone or email Monday through
More informationExchange Network Node Help Desk. NOLA Conference Feb 9-10, 2004
Exchange Network Node Help Desk NOLA Conference Feb 9-10, 2004 Outline Node Building Resources Review ECOS Node Help Desk, Docs, FAQs, DNCs Amplified Help Desk Support Procedures Getting started on your
More informationColorado Sex Offender Management Board (SOMB) INTENT TO APPLY. as a POLYGRAPH EXAMINER. for the Adult and Juvenile Provider List
Colorado Sex Offender Management Board (SOMB) INTENT TO APPLY as a POLYGRAPH EXAMINER for the Adult and Juvenile Provider List Colorado Department of Public Safety Division of Criminal Justice Office of
More informationScope Statement for the Criminal Reporting System (CRS) Project
State of Minnesota Department of Public Safety Bureau of Criminal Apprehension Scope Statement for the Criminal Reporting System (CRS) Project Version 1.1 Submitted on January 14, 2014 Scope Statement
More informationKansas ecitation Submission Service Service Description Document
Kansas ecitation Submission Service Service Description Document v 1.0.0 July 15, 2011 Page 1 Table of Contents Document Introduction... 4 ECitation Data Submission Service Overview... 6 Purpose... 6 Scope...
More informationStandard CIP 004 3a Cyber Security Personnel and Training
A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-3a 3. Purpose: Standard CIP-004-3 requires that personnel having authorized cyber or authorized unescorted physical access
More informationFrequently Asked Questions About Getting On NCAtrak
Frequently Asked Questions About Getting On NCAtrak Frequently Asked Questions About Getting on NCAtrak (technology reaching all kids) 1. What is NCAtrak? NCAtrak is a computerized, web-based case tracking
More informationOpenFox. Configurator
OpenFox Configurator Product Guide 2018 OpenFox Configurator Ever-changing technology and demands for information at a faster pace poses the challenge of ensuring your system is flexible and able to adapt
More informationCHANGE CONTROL FORM. ORIGINATOR'S NAME: Lou Leffer DATE: 08 September 2000 CHANGE REQUEST SUMMARY: Study Mode, Flow-Based CHANGE REVISION: 1.
CHANGE CONTROL FORM ORIGINATOR'S NAME: Lou Leffer DATE: 08 September 2000 CHANGE REQUEST SUMMARY: Study Mode, Flow-Based CHANGE REVISION: 1.1 CHANGE REQUEST DETAIL: The details of the Study Mode, Flow-Based
More informationTIME SYSTEM SECURITY AWARENESS HANDOUT
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/16/2017 2018 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
More informationNext Generation Identification Rap Back Services
Next Generation Identification Rap Back Services Presented by: Jimmy Mills Management and Program Analyst Rap Back Services Team Theresa Yarboro Management and Program Analyst Rap Back Services Team 1
More informationThe latest version of this profile can be found on the location specified in 1.3
FORTHcert Profile according to RFC 2350 1. About this document 1.1 Date of Last Update This is version 1, published 2012/02/1. 1.2 Distribution List for Notifications The latest version of this profile
More informationFlorida s Integrated Report Exchange System (FIRES) Public Crash Portal Resource and Tutorial Guide
Florida s Integrated Report Exchange System (FIRES) Public Crash Portal Resource and Tutorial Guide Table of Contents Overview and Types of Crashes Included Page 3 Quick Statistics.Pages 4-5 Advanced Search..Pages
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationPolicies, Notices, & Instructions Minnesota Trial Court Public Access (MPA) Remote View For Use with MPA Remote on the Internet
Policies, Notices, & Instructions Minnesota Trial Court Public Access (MPA) Remote View For Use with MPA Remote on the Internet Copyright 2007, 2008 by the State of Minnesota, State Court Administrator's
More informationPKI Disclosure Statement Digidentity Certificates
PKI Disclosure Statement Digidentity Certificates Title PKI Disclosure Statement Digidentity Certificates Date 25 March 2019 Author Digidentity Version 2019-v1 Classification Public Digidentity 2019 Revisions
More informationNational Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign
This document is scheduled to be published in the Federal Register on 11/29/2016 and available online at https://federalregister.gov/d/2016-28627, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE
More informationTexas Department of Family and Protective Services
Texas Department of Family and Protective Services Automated Background Check System (ABCS) User Guide Updated November 2016 Table of Contents DFPS AUTOMATED BACKGROUND CHECK SYSTEM (ABCS) USER MANUAL
More informationa. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard
Kiosk Security Standard 1. Purpose This standard was created to set minimum requirements for generally shared devices that need to be easily accessible for faculty, staff, students, and the general public,
More informationYou ve been breached: Now What? Minnesota s Data Breach Preparation and Notification for Electronic Data
You ve been breached: Now What? Minnesota s Data Breach Preparation and Notification for Electronic Data Enterprise IT Management Initiative State of Minnesota Jenna Covey, jenna.covey@state.mn.us, 651-201-1199
More informationVictim Assistance & Restorative Justice Program s Registrant/Victim Input at Offender Intake Form
Victim Assistance & Restorative Justice Program s Registrant/Victim Input at Offender Intake Form The Minnesota Department of Corrections goal is to promote safety in the lives of victims and others who
More informationMonthly Performance Metrics. December 2018
Department of Technology Monthly Performance Metrics December 2018 Compliance Level Legend In Compliance Out of Compliance Within Tolerance Insufficient Data SERVICE AVAILABILITY Target Performance Actual
More informationUnofficial English translation offered by EuropElectro, for reference only
Ref. No. CNCA-00C-007 DETAILED IMPLEMENTATION RULES FOR COMPULSORY PRODUCTS CERTIFICATION Submission, Dissemination and Publication of Information Issued on Jan. 8, 2014 Implemented on Jan. 8, 2014 Published
More informationNew York State Integrated Justice Information Exchange Project. NGA GJXDM Policy Academy April 18-20, 2006
New York State Integrated Justice Information Exchange Project NGA GJXDM Policy Academy April 18-20, 2006 NYS Team Representatives at 2006 Policy Academy Name Title Agency Marlaine Hoffman Deputy Director
More informationSecurity Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Security Control Mapping of CJIS Security Policy Version 5.3 s to NIST Special Publication 800-53
More informationInformation Security Incident Response and Reporting
Information Security Incident Response and Reporting Original Implementation: July 24, 2018 Last Revision: None This policy governs the actions required for reporting or responding to information security
More informationAppendix. In the Appendix: Online Help GRITS Help Desk
Appendix In the Appendix: Online Help GRITS Help Desk Online Help GRITS online help function provides you with both screen-specific help and a general help index. You may access online help from any screen
More informationAccess to University Data Policy
UNIVERSITY OF OKLAHOMA Health Sciences Center Information Technology Security Policy Access to University Data Policy 1. Purpose This policy defines roles and responsibilities for protecting OUHSC s non-public
More informationHawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011
Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Presentation Topics Current and Future HIJIS Activities Background HIJIS Strategic Plan HIJIS Architecture Joins
More informationTherapy Provider Portal. User Guide
Therapy Provider Portal User Guide Page 2 of 16 UCare User Guide V1.7 Table of Contents I. Introduction...3 About HSM Therapy Management... 4 Terms of Use... 4 Contact Information... 6 II. Using the Therapy
More informationICT User Access Security Standard Operating Procedure
ICT User Access Security Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised
More informationFRC HUB OPERATIONAL TERMS AND CONDITIONS
FRC HUB OPERATIONAL TERMS AND CONDITIONS PREPARED BY: DOCUMENT REF: 308009 VERSION: 56.0 DATE: FINALDRAFT : MARKET PERFORMANCE TBA 1. RECITALS Definitions Recitals Subscriber means any business that sends
More informationThe University of British Columbia Board of Governors
The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:
More informationTraining Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives
Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives Arkansas Department of Health Prescription Monitoring Program March 2016 Contents Contents 1 Document Overview...
More informationAccess Control Policy
Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,
More information# B: Key Code Security Rules and Information on GM KeyCode Look-Up Application - (Jan 9, 2009)
Page 1 of 11 Document ID: 2221721 #06-00-89-051B: Key Code Security Rules and Information on GM KeyCode Look-Up Application - (Jan 9, 2009) Subject: Key Code Security Rules and Information on GM KeyCode
More informationElectronic Authentication Steps for Accessing EvaluationWeb
Electronic Authentication Steps for Accessing EvaluationWeb Before EvaluationWeb access is granted, all persons requesting access must be e-authenticated (identity proofed) via the CDC s Secure Access
More informationFlorida. Increase Usage
Florida Law enforcement officials, victim advocates and crime victims alike offer high marks for the nation s leading automated victim notification solution. Known in most states as VINE (Victim Information
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationProtecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors
Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program
More informationComprehensive Case Information System (CCIS) 2017 Regional Training Workshops
Comprehensive Case Information System (CCIS) 2017 Regional Training Workshops CCIS Background CCIS Comprehensive Case Information System Statewide Court Case Data and Records Florida Statute - 28.24(12)(e)
More informationSecurity and Patient Privacy Handling Key features & responsibilities
Trusted information systems for health professionals The integrated solution for the electronic management of clinical trials From the design of the electronic Case Report Forms to database lock Security
More informationLaws of 2012, Chapter 277, Article I, Section 88 Records Management; Legislative Report
This document is made available electronically by the Minnesota Legislative Reference Library as part of an ongoing digital archiving project. http://www.leg.state.mn.us/lrl/lrl.asp Laws of 2012, Chapter
More informationStandard CIP 005 2a Cyber Security Electronic Security Perimeter(s)
A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2a 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)
More information2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY
2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY The New Jersey Office of Homeland Security and Preparedness () offers internships to a select group of applicants. These are part-time, unpaid internships for
More informationFBI Criminal History Record Certification Program
FBI Criminal History Record Certification Program P. David Morgan Fingerprint Examiner Instructor Federal Bureau of Investigation Criminal Justice Information Services Division Biometric Services Section
More informationINCIDENT-BASED CRIME REPORTING
INCIDENT-BASED CRIME REPORTING NCS-X and NIBRS Program Planning Bureau of Justice Statistics Federal Bureau of Investigation IACP/SEARCH/RTI/IJIS/PERF 1 AGENDA Overview of the NCS-X Program Overview of
More informationCriminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud
Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains
More informationDymoke Law Office, P.A. 300 Riverside Avenue NW Melrose, Minnesota Telephone (320) Fax (320)
Dymoke Law Office, P.A. 300 Riverside Avenue NW Melrose, Minnesota 56352 Telephone (320) 256-4205 Fax (320) 256-7201 February 21, 2017 Adrianna Hennen City of Freeport 125 Main Street East BY ELECTRONIC
More informationFederal Bureau of Investigation CJIS Division Next Generation Identification
Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment
More informationInformation Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV
Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf
More informationEnterprise Guest Access
Data Sheet Published Date July 2015 Service Overview Whether large or small, companies have guests. Guests can be virtually anyone who conducts business with the company but is not an employee. Many of
More informationTesco Bank Click2Park - User Guide
Table of Contents 1. Introduction 1.0 Overview of Car Share, Blue Badge Permits & HotSpaces 1.1 Registering with Click2Park 1.2 Logging On to Click2Park 2. Getting to Know Click2Park 2.1 Space Types 2.2
More informationPostal Inspection Service Mail Covers Program
Postal Inspection Service Mail Covers Program May 28, 2014 AUDIT REPORT Report Number HIGHLIGHTS BACKGROUND: In fiscal year 2013, the U.S. Postal Inspection Service processed about 49,000 mail covers.
More informationGM Information Security Controls
: Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5
More information[DATA SYSTEM]: Privacy and Security October 2013
Data Storage, Privacy, and Security [DATA SYSTEM]: Privacy and Security October 2013 Following is a description of the technical and physical safeguards [data system operator] uses to protect the privacy
More informationCA IdentityMinder. Glossary
CA IdentityMinder Glossary 12.6.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational
More informationAgency Registration and Broker Certification
Contents Agency Registration and Broker Certification... 1 Broker Certification Steps... 3 Agency Registration and Certification Step by Step... 3 Agency Registration... 4 Agency Roles... 4 Agency Registration
More informationCommonwealth of Pennsylvania - Justice Network
Commonwealth of Pennsylvania - Justice Network Published: June 1999 FIORANO CUSTOMER SOLUTION Commonwealth of Pennsylvania uses Fiorano s solution to enhance public safety in the State by enabling Real
More informationSubstitute Quick Reference (SmartFindExpress Substitute Calling System and Web Center)
Substitute Quick Reference (SmartFindExpress Substitute Calling System and Web Center) System Phone Number 578-6618 Help Desk Phone Number 631-4868 (6:00 a.m. 4:30 p.m.) Write your Access number here Write
More informationNC Department of Justice
Information Technology Division (ITD) Presented to: House Appropriations Subcommittee for Information Technology Scott Glawson CIO NC Department of Justice 05/09/2013 ITD Organizational Structure 73 IT
More informationSecurity and Fleet Manager
Security and Fleet Manager Location: [Europe & the Middle East] [Jordan] Town/City: Amman Category: Security Job Type: Open-ended, Full-time Position Title: Security and Fleet Manager PURPOSE OF POSITION:
More informationOracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017
Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationIDENTITY THEFT PREVENTION Policy Statement
Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy
More informationIBM Proventia Management SiteProtector Policies and Responses Configuration Guide
IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,
More informationParticipant User Guide, Version 2.6
Developers Integration Lab (DIL) Participant User Guide, Version 2.6 3/17/2013 REVISION HISTORY Author Date Description of Change 0.1 Laura Edens Mario Hyland 9/19/2011 Initial Release 1.0 Michael Brown
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationRFQ OIT-1 Q&A. Questions and Answers, in the order received.
Question Does the system have an existing SSP? Do they use a system like Xacta or CSAM to generate the SSP. Will they provide us the current POAM list? Will they provide scanning tools or we have to bring
More informationData Protection Policy
Introduction In order to; provide education, training, assessment and qualifications to its customers and clients, promote its services, maintain its own accounts and records and support and manage its
More informationPlease contact the Justice Center at with any questions.
TO: FROM: Executive Directors, Voluntary Providers DDSOO and DDRO Directors Provider Association Megan O Connor-Hebert, Deputy Commissioner Division of Quality Improvement DATE: August 19, 2013 SUBJECT:
More informationSLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004
SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 This document provides an overview of the program put into place by the South Carolina Law Enforcement Division (SLED)
More informationTechnical Communications Systems Overview JLR WEB
Jaguar Land Rover elearning TC-JLR-WEB: Technical Communications Systems Overview JLR WEB Contents Overview 3 Document Details 9 Posting and Notification 13 Electronic Product Quality Reporting (EPQR)
More informationComprehensive Case Information System (CCIS) August 22, 2017
Comprehensive Case Information System (CCIS) August 22, 2017 CCIS Background CCIS Comprehensive Case Information System Statewide Court Case Data and Records Florida Statute - 28.24(12)(e) Provides controlled
More informationStandard CIP 005 4a Cyber Security Electronic Security Perimeter(s)
A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-4a 3. Purpose: Standard CIP-005-4a requires the identification and protection of the Electronic Security Perimeter(s)
More informationTraining Guide for Practitioners. Washington State Department of Health Washington State Prescription Monitoring Program
Training Guide for Practitioners Washington State Department of Health Washington State Prescription Monitoring Program April 2017 Training Guide for Practitioners Contents Contents 1 Document Overview...
More informationINFORMED VISIBILITY. Mail Tracking & Reporting Actions for Transitioning to a Secure Transfer Method
INFORMED VISIBILITY Mail Tracking & Reporting Actions for Transitioning to a Secure Transfer Method January 16, 2018 Discontinued Support for Non-Secure FTP After January 31, 2018, Informed Visibility
More informationINFORMATION SECURITY-SECURITY INCIDENT RESPONSE
Information Technology Services Administrative Regulation ITS-AR-1506 INFORMATION SECURITY-SECURITY INCIDENT RESPONSE 1.0 Purpose and Scope The purpose of the Security Response Administrative Regulation
More informationJudiciary Judicial Information Systems
Audit Report Judiciary Judicial Information Systems August 2016 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY For further information concerning this report
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationTax Year 2010 Maryland Combined Corporate Reporting System Handbook
Tax Year 2010 Maryland Combined Corporate Reporting System Handbook for corporations/software developers who file a proforma via the Combined Corporate Reporting System March 2011 Bureau of Revenue Estimates
More informationHIDTA s Overdose Detection Mapping Application Program ODMAP ODMAP ODMAP free-of-charge
ODMAP HIDTA s Overdose Detection Mapping Application Program ODMAP, assists public health, fire, emergency medical service and law enforcement agencies track known and suspected overdose incidents. ODMAP
More informatione180 Privacy Policy July 2018
e180 Privacy Policy July 2018 We are e180, the creators of Braindate. We care deeply about protecting your personal information, so we ve outlined everything you need to know about it here. Last modified:
More informationSubstitute Quick Reference Card
Substitute Quick Reference Card System Phone Number 240-439-6900 Help Desk Phone Number 301-644-5120 ID PIN System Calling Times Week Day Today s Jobs Future Jobs Weekdays Starts at 6:00 a.m. 5:00 p.m.
More informationWhatsConfigured for WhatsUp Gold 2016 User Guide
WhatsConfigured for WhatsUp Gold 2016 User Guide Contents Welcome to WhatsConfigured 1 What is WhatsConfigured? 1 Finding more information and updates 1 Sending feedback 2 Deploying WhatsConfigured 3 STEP
More informationPrivacy Policy Effective May 25 th 2018
Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand
More informationInstructions for New Markets Tax Credit Program Applicants in Electronic Handbooks
Instructions for New Markets Tax Credit Program Applicants in Electronic Handbooks General Instructions for All NMTC Applicants: Required Software Internet Explorer 5.5 or Netscape Navigator 6.0 (ensure
More informationForeScout CounterACT. Configuration Guide. Version 5.0
ForeScout CounterACT Core Extensions Module: Reports Plugin Version 5.0 Table of Contents About the Reports Plugin... 3 Requirements... 3 Supported Browsers... 3 Verify That the Plugin Is Running... 5
More informationOhio Supercomputer Center
Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
More information