Toward a Manageable Criminal History System
|
|
- Bertram Manning
- 6 years ago
- Views:
Transcription
1 BJS/SEARCH Web Seminar Toward a Manageable Criminal History System BJS/SEARCH, The National Consortium for Justice Information and Statistics 1
2 Sponsored by The Bureau of Justice Statistics (BJS), U.S. Department of Justice SEARCH, The National Consortium for Justice Information and Statistics Presented by Robert L. Marx BJS/SEARCH, The National Consortium for Justice Information and Statistics 2
3 What is a Seminar? It s not a sales presentation It s not a collaboration It s not a conference It s not a staff meeting It s not a symposium A seminar is an attempt to plant a seed that will grow to a tree and bear fruit BJS/SEARCH, The National Consortium for Justice Information and Statistics 3
4 Who will Nurture the Seeds? Criminal History System (CHS) agency heads CHS management CHS oversight staff CHS audit staff Automated Fingerprint Identification System (AFIS) decision makers CHS software house decision makers CHS funding agency staff/management BJS/SEARCH, The National Consortium for Justice Information and Statistics 4
5 What is a Manageable CHS? Defined self-enforcing processes Robust quality measurement Completeness measurements Accuracy measurements Timeliness measurements Continual quality measurement Continual improvement BJS/SEARCH, The National Consortium for Justice Information and Statistics 5
6 Building the Future: One Subsystem* at a Time Big projects fail; small projects succeed. Big projects disrupt; small projects enable. Big projects are usually external; small projects are often internal. * Subsystem: A division of a system that, in itself, has the characteristics of a system. BJS/SEARCH, The National Consortium for Justice Information and Statistics 6
7 What Subsystems are There? Query-report subsystem Database subsystem Incarceration subsystem Supervision subsystem Judicial subsystem Prosecutorial subsystem Arrest subsystem Identification subsystem BJS/SEARCH, The National Consortium for Justice Information and Statistics 7
8 Which Subsystem gets Built First? A subsystem with well-defined edges A well-understood and stable subsystem An easily measurable subsystem A big-payoff subsystem A subsystem closer than the frontier BJS/SEARCH, The National Consortium for Justice Information and Statistics 8
9 And the Winner Is: The Identification Subsystem Well-defined edges: one source and a halfdozen destinations Well-understood: NIST, AFIS, Livescan Easily measurable: completeness, accuracy, timeliness Big payoff for ID during booking process Closer than the frontier: pathfinder state already in action BJS/SEARCH, The National Consortium for Justice Information and Statistics 9
10 Components of the Identification Subsystem ecard Reception and Edit Service (RES) Identification Transaction Controller (ITC) Name Search Service (NSS) Automated Fingerprint Identification System (AFIS) Analysis module External connectors BJS/SEARCH, The National Consortium for Justice Information and Statistics 10
11 ecard Reception and Edit Service (RES) Convert to ecards from paper Receive ecards from contributors and converters Edit ecards, reject for wrong mandatory fields, remove wrong optional fields Maintain First In, First Out (FIFO)-prioritized queues by type and age; release highest-oldest ecard to Internet Transfer Control (ITC) when asked BJS/SEARCH, The National Consortium for Justice Information and Statistics 11
12 Transaction Controller, Stage 1 Take highest-oldest ecard from RES Set up a transaction record Request Open Name Search (ONS) and Open Fingerprint Search (OFS) Receive and record ONS and OFS responses Calculate ONS category, OFS category and result zone BJS/SEARCH, The National Consortium for Justice Information and Statistics 12
13 What are Categories and Zones? Three ONS categories: high, medium, low score Three OFS categories: high, medium, low Two outcome types: same and different 3 * 3 * 2 = 18 result zones Each zone has assigned to it a specific strategy for moving toward a decision BJS/SEARCH, The National Consortium for Justice Information and Statistics 13
14 Transaction Controller, Stage 2 Closed Name Search (CNS) and Closed Fingerprint Search (CFS) cross-check stage- 1 results when ONS and OFS give different candidates Human verification provides final decisions in all zones originally Decisions-by-rule is available for some zones when/if CHS management deems it appropriate BJS/SEARCH, The National Consortium for Justice Information and Statistics 14
15 Transaction Controller, Stage 3 Update the NSS and AFIS and CH files, if appropriate Update the ecard and send to archive and the FBI s Integrated AFIS (IAFIS), if appropriate Update transaction record and send to analysis file Purge transaction record BJS/SEARCH, The National Consortium for Justice Information and Statistics 15
16 Name Search Server (NSS) Needed: A method that always delivers a single candidate is more accurate than most current name search methods can be adjusted in response to operational experience is statistically independent of the AFIS method BJS/SEARCH, The National Consortium for Justice Information and Statistics 16
17 NSS Characteristics No exclusion, only match-scoring Scoring based on Bayesian probability theory Self-evaluating to measure its own accuracy At least 1,000 times more computerintensive than older search methods BJS/SEARCH, The National Consortium for Justice Information and Statistics 17
18 NSS Mathematics R = Reliability, S = Selectivity, Raw Element Score = R/S Refined Element Score = INT (1000 * log (Raw Element Score)) Refined Row Score = SUM (Refined Element Scores) So A score of 6000 suggests that the candidate is a million times more likely to be a mate than a random candidate BJS/SEARCH, The National Consortium for Justice Information and Statistics 18
19 NSS Elements Last Name - initial and remainder First Name - initial and remainder Middle Name - initial and remainder Name Suffix Sex Race Birth- day, month, and year Social Security Number BJS/SEARCH, The National Consortium for Justice Information and Statistics 19
20 Name Search Provisional Scores LNI ca. 1000, LNR ca FNI ca. 1000, FNR ca MNI ca. 1000, MNR ca NS ca. 500 Sex ca. 200, Race ca. 200 Bday ca. 1500, Bmonth ca. 1000, Byear ca SOC ca BJS/SEARCH, The National Consortium for Justice Information and Statistics 20
21 Name File Flat file Single key = SID + Sequence One or more rows per SID Inquiry types = ONS, CNS Result always one row + score BJS/SEARCH, The National Consortium for Justice Information and Statistics 21
22 Conclusions about NSS NSS is ready for detail design It should be more accurate than present state of practice It will provide the needed manageability Risk factor: computational intensity BJS/SEARCH, The National Consortium for Justice Information and Statistics 22
23 Automated Fingerprint Identification System (AFIS) Capabilities needed: Open Fingerprint Search (OFS) yielding single candidate and score Closed Fingerprint Search yielding single candidate and score Substantial OFS workload increase Adequate problem reporting Ability to receive instructions from ITC and respond appropriately BJS/SEARCH, The National Consortium for Justice Information and Statistics 23
24 Analysis Module: Capabilities Calculate accuracy of name search, fingerprint search, and system Calculate revised values for R, S, element scores, name search category boundaries, fingerprint search category boundaries Calculate receipt-to-decision time for each ecard type Calculate ecard reject rates and causes Evaluate new strategies and tactics BJS/SEARCH, The National Consortium for Justice Information and Statistics 24
25 The Grand Summary A manageable CHS is a good thing A manageable CHS can begin with a manageable identification subsystem A manageable identification subsystem is being designed as we speak A manageable identification subsystem is scheduled to roll out in 2004 BJS/SEARCH, The National Consortium for Justice Information and Statistics 25
26 Seed Nurturing CHS agency heads could: Assign a person to track the pathfinder project and report to the management committee Assign a person to see how difficult it would be to isolate the identification function from the rest of the CHS software CHS management could: Launch a mini-project to get the name search detail design and test it Launch talks with an AFIS vendor BJS/SEARCH, The National Consortium for Justice Information and Statistics 26
27 Seed Nurturing (continued) CHS oversight staff could: Track the pathfinder project and consider briefing the oversight principals CHS audit staff could: Compare audit questions about timeliness, completeness, and accuracy to the pathfinder capabilities Consider endorsing implementation as part of system audit-ability BJS/SEARCH, The National Consortium for Justice Information and Statistics 27
28 Seed Nurturing (continued) AFIS decision makers could: Take the pathfinder concept to the AFIS user group Consider an in-afis transaction controller CHS software houses could: Consider an in-chs transaction controller Consider a Web-service name search service or a name search appliance BJS/SEARCH, The National Consortium for Justice Information and Statistics 28
29 Have a Question? Send your question by to webcast@search.org. We will respond by . We may provide your question and its answer to others, BUT all information concerning your name and organization will be stripped from the question and response, UNLESS you specifically request otherwise. BJS/SEARCH, The National Consortium for Justice Information and Statistics 29
30 Have a Comment or Suggestion? Send it by to webcast@search.org. We will acknowledge it by . If you use the subject line AGENCY COMMENT or AGENCY SUGGESTION, we will treat it as coming from the CHS agency head; otherwise, we will treat it as a personal comment or suggestion and will strip your name and affiliation. BJS/SEARCH, The National Consortium for Justice Information and Statistics 30
31 Acronym Glossary AFIS BJS CFS CHS CNS FIFO IAFIS ITC NIST NSS OFS ONS RES Automated Fingerprint Identification System Bureau of Justice Statistics Closed fingerprint search Criminal history system Closed name search First in, first, out Integrated Automated Fingerprint Identification System Identification transaction controller Internet Transfer Control National Institute of Standards and Training Name search service Open fingerprint search Open name search Reception and edit service BJS/SEARCH, The National Consortium for Justice Information and Statistics 31
32 This Concludes the Seminar We thank you for your time and attention. The Bureau of Justice Statistics, U.S. Department of Justice SEARCH, The National Consortium for Justice Information and Statistics Robert L. Marx BJS/SEARCH, The National Consortium for Justice Information and Statistics 32
I I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments:
From: Sent: lleo.gov] arch 24, 2011 1:55 PM To: I Cc: le.gov Subject: White House Domestic Policy Request Attachments: NG[ Summary.pdf; IAQ Data Dictionary.pdf; IAQscreenshot.pdf Attached, please find
More informationRecommendation 20.1 & Manager Gordon Brussow ID Unit Forensic Division
Recommendation 20.1 & 20.3 Manager Gordon Brussow ID Unit Forensic Division 20.1 The SFPD needs to develop reliable electronic in-custody arrest data. It needs to ensure that these arrest data accurately
More informationJudicial Inquiry System (JIS)
Judicial Inquiry System (JIS) Active Warrant Alert Calendaring System (AWACS) User Manual Office of the State Courts Administrator Created March 5, 2018 Table of Contents ABOUT THIS DOCUMENT... 3 SCOPE...
More informationFBI Next Generation Identification (NGI)
FBI Next Generation Identification (NGI) Bigger, Better, Faster NGI - Overview for Strategic Planning July 2013 1 IAFIS Database Criminal History File 75.4 million subjects with over 284+ million arrest
More informationMobile ID, the Size Compromise
Mobile ID, the Size Compromise Carl Gohringer, Strategic Business Development E-MOBIDIG Meeting, Bern, 25/26 September 1 Presentation Plan The quest for increased matching accuracy. Increased adoption
More informationCJIS Advisory Policy Board. Disposition Task Force. SEARCH 2011 Winter Membership Meeting
CJIS Advisory Policy Board Disposition Task Force 1 History The APB discussed the issue of incomplete records and the need to include courts in future discussions The APB recommended the formation of a
More informationGood morning, Chairman Harman, Ranking Member Reichert, and Members of
Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,
More informationIAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2
IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated
More informationHawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011
Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Presentation Topics Current and Future HIJIS Activities Background HIJIS Strategic Plan HIJIS Architecture Joins
More informationThe NIH Collaboratory Distributed Research Network: A Privacy Protecting Method for Sharing Research Data Sets
The NIH Collaboratory Distributed Research Network: A Privacy Protecting Method for Sharing Research Data Sets Jeffrey Brown, Lesley Curtis, and Rich Platt June 13, 2014 Previously The NIH Collaboratory:
More informationColorado Sex Offender Management Board (SOMB) INTENT TO APPLY. as a POLYGRAPH EXAMINER. for the Adult and Juvenile Provider List
Colorado Sex Offender Management Board (SOMB) INTENT TO APPLY as a POLYGRAPH EXAMINER for the Adult and Juvenile Provider List Colorado Department of Public Safety Division of Criminal Justice Office of
More informationAppendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014
Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Note to Submitters: The information in this document is provided for you to use in any manner most appropriate
More informationNAVIGATION GUIDE FEDERAL REGISTRY. General Information
NAVIGATION GUIDE FEDERAL REGISTRY General Information Purpose This navigation guide is designed to provide institution and individual users with a general concept and navigation of NMLS. Copyright 2014
More informationEV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND
EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND MARYLAND DEPARTMENT OF PUBLIC SAFETY AND CORRECTIONAL SERVICES INFORMATION TECHNOLOGY AND COMMUNICATIONS DIVISION FOR
More informationThe Smart Campaign: Introducing Certification
The Smart Campaign: Introducing Certification Elisabeth Rhyne, Managing Director Center for Financial Inclusion at ACCION Responsible Finance Forum Washington, DC April, 2012 Introducing The Smart Campaign
More informationGuidelines for Capturing Palmprints and Supplementals
Guidelines for Capturing Palmprints and Supplementals Guidelines for Capturing Palmprints and Supplementals General Overview: The FBI will implement palmprint and supplemental print search capabilities
More informationSmart Policing and Technology Applications
Smart Policing and Technology Applications Presentation at the IACP LEIM Conference San Diego, California June 15,2011 This project was supported by Grant No. 2009-DG-BX-K021 awarded by the Bureau of Justice
More informationJudicial Inquiry System (JIS)
Judicial Inquiry System (JIS) Jessica Lunsford Act (JLA) First Appearance Calendar User Manual Office of the State Courts Administrator Updated March 5, 2018 Table of Contents ABOUT THIS DOCUMENT... 3
More informationSTATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY
STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Minnesota Motor Registration Information Service (QMV) Published On: Feb 09, 2012 Service Release Version#: 1.0 Prepared
More informationJSC THE JUSTICE & SAFETY CENTER. Snapshot 2014
JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening
More informationSecurity Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Security Control Mapping of CJIS Security Policy Version 5.3 s to NIST Special Publication 800-53
More informationCOUNTY OF LOS ANGELES REQUEST FOR INFORMATION. RFI No. 414-SH MULTI-BIOMETRIC IDENTIFICATION SYSTEM
COUNTY OF LOS ANGELES REQUEST FOR INFORMATION RFI No. 414-SH MULTI-BIOMETRIC IDENTIFICATION SYSTEM RFI NO. 414-SH COUNTY OF LOS ANGELES SHERIFF S DEPARTMENT Request for Information (RFI) Project No. 414-SH
More informationMissouri State Highway Patrol. OCN Query Application. Detailed Requirements Specification Version 1.3
Missouri State Highway Patrol OCN Query Application Detailed Requirements Specification Version 1.3 Table of Contents 1 Document Description... 6 1.1 Intent... 6 1.2 Executive Summary... 6 1.3 Overview...
More informationREVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009
APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto
More informationSecure Web Fingerprint Transaction (SWFT) Frequently Asked Questions
Defense Manpower Data Center Personnel Security and Assurance Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions Version 1.4 March 1, 2017 Contract Number: GS00Q09BGD0027 Task Order:
More informationTechnical Procedure for the SAFIS/AFIT
Technical Procedure for the SAFIS/AFIT 1.0 Purpose - This procedure describes how to operate the State Automated Fingerprint Identification System/Advanced Fingerprint Identification Technology (SAFIS/AFIT).
More informationEDUCATOR. Certified. to know to become a. What you need. in Florida. General Certification. Requirements for. Individuals Applying
What you need to know to become a Certified EDUCATOR in Florida General Certification Requirements for Individuals Applying for Initial Certification Beginning July 1, 2002 Bureau of Educator Certification
More informationSLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004
SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 This document provides an overview of the program put into place by the South Carolina Law Enforcement Division (SLED)
More informationFBI Criminal History Record Certification Program
FBI Criminal History Record Certification Program P. David Morgan Fingerprint Examiner Instructor Federal Bureau of Investigation Criminal Justice Information Services Division Biometric Services Section
More informationNGI and Rap Back Focus Group Briefing
NGI and Rap Back Focus Group Briefing 2012 SEARCH Annual Membership Group Meeting July 17-19 Brad Truitt Rachel Tucker John Kane 1 Introduction Welcome NGI Update Rap Back Overview/Update Rap Back Focus
More informationMFA DIGITAL FOUNDATIONS CERTIFICATION PROGRAM
MFA DIGITAL FOUNDATIONS CERTIFICATION PROGRAM FREQUENTLY ASKED QUESTIONS (FAQs) 1. What does the Certification cover? 2. Why do I need Certification? 3. Who developed the MFA Digital Foundations Certification
More informationCape Breton- Victoria Regional School Board
Cape Breton- Victoria Regional School Board APPLICATION PROCEDURE FOR SUBSTITUTE TEACHING Complete substitute application form and attach a photocopy of your valid Nova Scotia teaching license, along with
More informationUpdated: 2014 January. Continuing Professional Education (CPE) Policy
Updated: 2014 January Continuing Professional Education (CPE) Policy Table of Contents Overview... 2 CRISC Certification Requirements... 2 General Requirements Annual and Three-year Certification Period
More informationDNA Database Section Procedure. 2.0 Scope The procedures in this document apply to the DNA Database Section at the State Crime Laboratory.
DNA Database Section Procedure 1.0 Purpose To outline the procedures for the operation of the DNA Database Section. 2.0 Scope The procedures in this document apply to the DNA Database Section at the State
More informationIT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I
Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program
More informationDLS DEF1437. Case 2:13-cv Document Filed in TXSD on 11/19/14 Page 1 of 10 USE CASE SPECIFICATION. 2:13-cv /02/2014
Case 2:13-cv-00193 Document 774-33 Filed in TXSD on 11/19/14 Page 1 of 10 An USE CASE SPECIFICATION ISSUE ELECTION CERTIFICATE Texas Department of Public Safety September 13 2013 Version 10 2:13-cv-193
More informationRisk Management FAQs NYSWYSA LPGA Drive Corning, NY 14830
Risk Management FAQs 2016-17 NYSWYSA 11397 LPGA Drive Corning, NY 14830 Contents Policies and Procedures... 3 Purpose... 3 Who is Required to Have Risk Management?... 3 Minor Risk Management Process...
More informationStatewide Student Identifiers (SSIDs or SIDs)
Statewide Student Identifiers (SSIDs or SIDs) Overview SSIDs, which are unique to the state of Ohio, are used for funding and tracking longitudinal student data. The SSID system provides a way for ODE
More informationIntegrating Complex Regional Information Sharing Programs
Integrating Complex Regional Information Sharing Programs in the National Capital Region Dave Russell Fairfax County, VA Police 1 st Sgt Ross Randlett Prince William County, VA Police Captain Mitch Cunningham
More informationFlorida Agency for Health Care Administration Auditor General IT Operational Audit (Report No ) Six-Month Status Report as of July 11, 2017
Six-Month Status Report Finding #1 Recommendation Previous Management Information Security Program Plan. The Agency s Information Technology Security Plan needs improvement to provide for comprehensive
More informationThe Business Value of Metadata for Data Governance: The Challenge of Integrating Packaged Applications
The Business Value of Metadata for Data Governance: The Challenge of Integrating Packaged Applications By Donna Burbank Managing Director, Global Data Strategy, Ltd www.globaldatastrategy.com Sponsored
More informationBiometric Offender Movement
Biometric Offender Movement Case Study Northern Ireland Prison Service CTA 2011 Patricia O Hagan, CEO Edward Hanna, Technical Director Agenda Background Northern Ireland Prison Service (NIPS) biometric
More informationAudit and Compliance Committee - Agenda
Audit and Compliance Committee - Agenda Board of Trustees Audit and Compliance Committee April 17, 2018, 1:30 2:30 p.m. President s Board Room Conference Call-In Phone #1-800-442-5794, passcode 463796
More informationTexas Department of Family and Protective Services
Texas Department of Family and Protective Services Automated Background Check System (ABCS) User Guide Updated April 2018 Table of Contents DFPS AUTOMATED BACKGROUND CHECK SYSTEM (ABCS) USER MANUAL Summary
More informationAddress: 730 Simms, Suite #109, Golden, CO Digital Government: Government to Citizen (G to C)*
NASCIO Nomination Form Title of Nomination: Colorado Integrated Criminal Justice Information System (CICJIS) Project/System Manager: Theresa Brandorff Job Title: Agency: Chief Information Officer Colorado
More informationCybersecurity and Hospitals: A Board Perspective
Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,
More informationNew Spanish Regulation Tightens Up Data Protection Requirements RAFI AZIM-KHAN, JOHN NICHOLSON, ALESSANDRO LIOTTA, AND DOMINIC HODGKINSON
New Spanish Regulation Tightens Up Data Protection Requirements RAFI AZIM-KHAN, JOHN NICHOLSON, ALESSANDRO LIOTTA, AND DOMINIC HODGKINSON The Spanish government has enacted a new regulation that further
More informationTexas Department of Family and Protective Services
Texas Department of Family and Protective Services Automated Background Check System (ABCS) User Guide Updated November 2016 Table of Contents DFPS AUTOMATED BACKGROUND CHECK SYSTEM (ABCS) USER MANUAL
More informationJudiciary Judicial Information Systems
Audit Report Judiciary Judicial Information Systems August 2016 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY For further information concerning this report
More informationMANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS
MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS The purpose of this document is to establish and enforce Security Control of the access
More informationPennsylvania Certification by Endorsement
Pennsylvania Certification by Endorsement Thank you for your interest in obtaining Pennsylvania EMS Certification by Endorsement. This is the process whereby a person certified by a state other than Pennsylvania
More informationJOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION
JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION PRESENTED BY: Leon Frederick, CIO, Iowa Department of Public Safety Liz Pearson, URL Integration PRESENTATION OVERVIEW What is N-DEx? What is Iowa
More informationMatching Performance for the US-VISIT IDENT System Using Flat Fingerprints NISTIR C. L. Wilson, M. D. Garris, & C. I. Watson
Matching Performance for the US-VISIT IDENT System Using Flat Fingerprints NISTIR 7110 C. L. Wilson, M. D. Garris, & C. I. Watson MAY 2004 Matching Performance for the US-VISIT IDENT System Using Flat
More informationThomas Jefferson University College of Nursing Undergraduate BSN Programs Center City & Abington-Dixon Campuses Pre-matriculation Completion Guide
Thomas Jefferson University College of Nursing Undergraduate BSN Programs Center City & Abington-Dixon Campuses Pre-matriculation Completion Guide Part I: Placing your order in Complio Pre-Step A Navigate
More informationData Protection Policy
Introduction In order to; provide education, training, assessment and qualifications to its customers and clients, promote its services, maintain its own accounts and records and support and manage its
More information2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.
More informationFederal Bureau of Investigation CJIS Division Next Generation Identification
Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment
More informationICS-ACI Policy Series
ICS-ACI Policy Series This is part of a series of documents that make up the formal policies adopted by the Institute for CyberScience at the Pennsylvania State University. Last Updated: September 5, 2017
More informationNERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS
NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements
More informationFederal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011
Federal Continuous Monitoring Working Group March 21, 2011 DOJ Cybersecurity Conference 2/8/2011 4/12/2011 Why Continuous Monitoring? Case for Change Strategy Future State Current State Current State Case
More informationAdvisory Commission on the Administration of Justice April 19, Julie Butler Division Administrator. Dedication, Pride, Service
Advisory Commission on the Administration of Justice Julie Butler Division Administrator Dedication, Pride, Service Statutory Authority Housed within the General Services Division of DPS (NRS 480.130,
More informationTexas Department of Public Safety Crime Records Service. FACT Clearinghouse User Guide
Texas Department of Public Safety Crime Records Service FACT Clearinghouse User Guide July 2016 Contents Introduction... 3 Signing In... 3 Worklists... 3 Accessing the Worklist... 4 List of Applicants...
More informationRegistry Provider/Recipient Eligibility and Complaint Policy
Purpose: To clearly define the application requirements, causes for exemption, causes for removal, complaint process and appeals process for In-Home Supportive Services (IHSS) Registry Providers and Recipients.
More informationBiometric Center of Excellence (BCOE)
Federal Bureau of Investigation Science & Technology Branch Criminal Justice Information Services Division Biometric Center of Excellence (BCOE) International Association for Identification 100 Year -
More informationCare Provider Background Screening Clearinghouse
Care Provider Background Screening Clearinghouse Clearinghouse Renewal Instruction Guide Updated October 2017 Page 1 of 15 Contents Contents... 2 Clearinghouse Renewal Overview... 3 Background Screening
More informationFinFit will request and collect information in order to determine whether you qualify for FinFit Loans*.
FinFit Web Privacy Policy General: This Privacy Policy ( Policy ) describes the ways FinFit, LLC ( FinFit, we, us) collects, stores, uses and protects information we receive from you or that you may provide
More informationIstisna Creation Oracle FLEXCUBE Universal Banking Release [May] [2011] Oracle Part Number E
Istisna Creation Oracle FLEXCUBE Universal Banking Release 11.3.0 [May] [2011] Oracle Part Number E51511-01 Table of Contents Origination of Istisna 1. ISTISNA ORIGINATION... 1-1 1.1 INTRODUCTION... 1-1
More informationThe Honorable Porter J. Goss Chairman, Permanent Select Committee on Intelligence House of Representatives
United States General Accounting Office Washington, DC 20548 November 14, 2003 The Honorable Porter J. Goss Chairman, Permanent Select Committee on Intelligence House of Representatives The Honorable Nancy
More informationCoordination, Collaboration and Integration: Canada s National Crime Prevention Strategy
Coordination, Collaboration and Integration: The Major Challenges of the 21 st Century Coordination, Collaboration and Integration: Canada s National Crime Prevention Strategy XII ICPC Colloquium November
More informationNext Generation Identification Rap Back Services
Next Generation Identification Rap Back Services Presented by: Jimmy Mills Management and Program Analyst Rap Back Services Team Theresa Yarboro Management and Program Analyst Rap Back Services Team 1
More informationCommunications Management Plan Template
Communications Management Plan Template Project Name: U.S. Department of Housing and Urban Development October, 2010 Communications Management Plan Template (V1.0) VERSION HISTORY [Provide information
More informationRFQ OIT-1 Q&A. Questions and Answers, in the order received.
Question Does the system have an existing SSP? Do they use a system like Xacta or CSAM to generate the SSP. Will they provide us the current POAM list? Will they provide scanning tools or we have to bring
More informationAdministrative Directive No. 4: 2011 Continuing Professional Education Requirements for All Certification Programs
Administrative Directive No. 4: 2011 Continuing Professional Education Requirements for All Certification Programs Purpose This document contains the mandatory Continuing Professional Education (CPE) requirements
More informationTechnical Trust Policy
Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality
More informationBCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA
BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA AGENDA TOPICS Overview of MNJIS Product Managers Role and Purpose Information
More informationConnect To Home Eastern PA CoC Coordinated Entry System HMIS Guide
Connect To Home Eastern PA CoC Coordinated Entry System HMIS Guide Updated: February 2018 1 P a g e Table of Contents Introduction... 4 Training Class... 4 Workgroup... 4 Coordinated Entry Process... 4
More informationTHE DEPARTMENT OF JUSTICE BUREAU OF CRIMINAL IDENTIFICATION AND INFORMATION APPLICANT PROCESSING PROGRAM LIVE SCAN REQUEST PACKET
THE DEPARTMENT OF JUSTICE BUREAU OF CRIMINAL IDENTIFICATION AND INFORMATION APPLICANT PROCESSING PROGRAM LIVE SCAN REQUEST PACKET DEPARTMENT OF JUSTICE BUREAU OF CRIMINAL IDENTIFICATION AND INFORMATION
More informationInformation Security Incident Response and Reporting
Information Security Incident Response and Reporting Original Implementation: July 24, 2018 Last Revision: None This policy governs the actions required for reporting or responding to information security
More informationCOST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process
COST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process Whitepaper by: Steve Rafferty - Founder/CEO ActiveProspect Running a Cost Per Lead advertising campaign seems
More informationB. EXECUTIVE SUMMARY. Page 2 of 7
B. EXECUTIVE SUMMARY The New York State Division of Criminal Justice Services (DCJS) takes New York s Governor David A. Paterson s comment -- More and more citizens and businesses rely on technology to
More informationWestern Identification Network Service Strategy (January, 2008)
Western Identification Network Service Strategy (January, 2008) The purpose of this paper is to help members and other interested parties understand the unique nature of services provided by WIN that no
More informationIntroduction. October 2017
BRAD TRUITT Chair TIMOTHY LOTT Interim Executive Director October 2017 Introduction SEARCH recently conducted an informal survey 1 of its Membership Group to gain a better understanding of how CJIS Systems
More informationJMS User. Version
JMS User Version 11.4.0.600 Table of Contents Booking Menu... 5 Inmate Booking: Person... 5 Projected Release Date... 6 Gangs... 6 Pre-Book... 6 Biometric... 6 ID # Search... 7 Detail Search... 7 Clear...
More informationBureau of Justice Statistics (BJS) - Law Enforcement law enforcement in a new century and a changing world improving the administration of.
DOWNLOAD OR READ : LAW ENFORCEMENT IN A NEW CENTURY AND A CHANGING WORLD IMPROVING THE ADMINISTRATION OF FEDERAL LAW ENFORCEMENT REPORT OF THE COMMISSION ON THE ADVANCEMENT OF FEDERAL LAW ENFORCEMENT IMPROVING
More informationMinistry of Government and Consumer Services. ServiceOntario. Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report
Chapter 3 Section 3.06 Ministry of Government and Consumer Services ServiceOntario Standing Committee on Public Accounts Follow-Up on Section 4.09, 2015 Annual Report In March 2016, the Committee held
More informationCrime Reporting in the Age of Technology
Crime Reporting in the Age of Technology Jan M. Chaiken Bureau of Justice Statistics U.S. Department of Justice June 14, 2000 Developments reflect efforts of many people in the Justice Department Federal
More informationApplied Coursework. Technology for Homeland Security Course Paper. Author: David Heller Cohort 0801/0802. Lead Instructor: Richard Bergin
Applied Coursework Technology for Homeland Security Course Paper Author: David Heller Cohort 0801/0802 Lead Instructor: Richard Bergin The Nation s Homeland Security Educator Learn more about the CHDS
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More informationDepartment of Public Safety and Correctional Services Information Technology and Communications Division
Audit Report Department of Public Safety and Correctional Services Information Technology and Communications Division January 2016 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND
More informationCertified Recovery Peer Advocate Application
Certified Recovery Peer Advocate Application A Project of Alcoholism & Substance Abuse Providers of New York State, Inc. 11 North Pearl Street, Suite 801 Albany, NY 12207 Phone: 518.426.3122 x 101 Candidate
More information2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY
2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on
More informationSonoma County s System-wide Efforts to Improve the Broader Criminal Justice System
Sonoma County s System-wide Efforts to Improve the Broader Criminal Justice System Jennifer Murray, Deputy County Administrator Tom Schwedhelm, Santa Rosa Chief of Police Robert Ochs, Chief Probation Officer
More informationRHY Data Completeness - Data Quality Report User Guide Operating Year October 1, 2017 to September 30, 2018
RHY Data Completeness - Data Quality Report User Guide Operating Year October 1, 2017 to September 30, 2018 Contents 1. INTRODUCTION...2 2. DESCRIPTION AND LAYOUT...2 2.1 Tab A Project Descriptor Summary...3
More informationRFQ OIT-1 Q&A. Questions and Answers, in the order received.
Question Does the system have an existing SSP? Do they use a system like Xacta or CSAM to generate the SSP. Will they provide us the current POAM list? Will they provide scanning tools or we have to bring
More informationEnterprise GRC Implementation
Enterprise GRC Implementation Our journey so far implementation observations and learning points Derek Walker Corporate Risk Manager National Grid 1 Introduction to National Grid One of the world s largest
More information1998 Issue Number 2. From the Inkpad to the Mousepad: IAFIS and Fingerprint Technology at the Dawn of the 21 st Century
Technical Bulletin featuring emerging technologies in criminal justice information management 1998 Issue Number 2 From the Inkpad to the Mousepad: IAFIS and Fingerprint Technology at the Dawn of the 21
More informationOnline Batch Services
Online Batch Services LexisNexis has enhanced its batch services to allow more user-friendly functionality for uploading batches and mapping layouts. Users sign in to the main product to access the online
More informationNSI. Suspicious Activity Reporting Line Officer Training
Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding
More informationIdentity Theft Victim s Complaint and Affidavit
Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors
More informationOPD PRESS/PUBLIC COMMENT/LEGISLATIVE/GUBERNATORIAL/ COMMENT POLICY (rev )
OPD PRESS/PUBLIC COMMENT/LEGISLATIVE/GUBERNATORIAL/ COMMENT POLICY (rev. 1-2017) I. MEDIA CONTACTS A. OPD Employees Need Advance Approval Before Making Public Statements or Responding to Media Requests
More information