Toward a Manageable Criminal History System

Size: px
Start display at page:

Download "Toward a Manageable Criminal History System"

Transcription

1 BJS/SEARCH Web Seminar Toward a Manageable Criminal History System BJS/SEARCH, The National Consortium for Justice Information and Statistics 1

2 Sponsored by The Bureau of Justice Statistics (BJS), U.S. Department of Justice SEARCH, The National Consortium for Justice Information and Statistics Presented by Robert L. Marx BJS/SEARCH, The National Consortium for Justice Information and Statistics 2

3 What is a Seminar? It s not a sales presentation It s not a collaboration It s not a conference It s not a staff meeting It s not a symposium A seminar is an attempt to plant a seed that will grow to a tree and bear fruit BJS/SEARCH, The National Consortium for Justice Information and Statistics 3

4 Who will Nurture the Seeds? Criminal History System (CHS) agency heads CHS management CHS oversight staff CHS audit staff Automated Fingerprint Identification System (AFIS) decision makers CHS software house decision makers CHS funding agency staff/management BJS/SEARCH, The National Consortium for Justice Information and Statistics 4

5 What is a Manageable CHS? Defined self-enforcing processes Robust quality measurement Completeness measurements Accuracy measurements Timeliness measurements Continual quality measurement Continual improvement BJS/SEARCH, The National Consortium for Justice Information and Statistics 5

6 Building the Future: One Subsystem* at a Time Big projects fail; small projects succeed. Big projects disrupt; small projects enable. Big projects are usually external; small projects are often internal. * Subsystem: A division of a system that, in itself, has the characteristics of a system. BJS/SEARCH, The National Consortium for Justice Information and Statistics 6

7 What Subsystems are There? Query-report subsystem Database subsystem Incarceration subsystem Supervision subsystem Judicial subsystem Prosecutorial subsystem Arrest subsystem Identification subsystem BJS/SEARCH, The National Consortium for Justice Information and Statistics 7

8 Which Subsystem gets Built First? A subsystem with well-defined edges A well-understood and stable subsystem An easily measurable subsystem A big-payoff subsystem A subsystem closer than the frontier BJS/SEARCH, The National Consortium for Justice Information and Statistics 8

9 And the Winner Is: The Identification Subsystem Well-defined edges: one source and a halfdozen destinations Well-understood: NIST, AFIS, Livescan Easily measurable: completeness, accuracy, timeliness Big payoff for ID during booking process Closer than the frontier: pathfinder state already in action BJS/SEARCH, The National Consortium for Justice Information and Statistics 9

10 Components of the Identification Subsystem ecard Reception and Edit Service (RES) Identification Transaction Controller (ITC) Name Search Service (NSS) Automated Fingerprint Identification System (AFIS) Analysis module External connectors BJS/SEARCH, The National Consortium for Justice Information and Statistics 10

11 ecard Reception and Edit Service (RES) Convert to ecards from paper Receive ecards from contributors and converters Edit ecards, reject for wrong mandatory fields, remove wrong optional fields Maintain First In, First Out (FIFO)-prioritized queues by type and age; release highest-oldest ecard to Internet Transfer Control (ITC) when asked BJS/SEARCH, The National Consortium for Justice Information and Statistics 11

12 Transaction Controller, Stage 1 Take highest-oldest ecard from RES Set up a transaction record Request Open Name Search (ONS) and Open Fingerprint Search (OFS) Receive and record ONS and OFS responses Calculate ONS category, OFS category and result zone BJS/SEARCH, The National Consortium for Justice Information and Statistics 12

13 What are Categories and Zones? Three ONS categories: high, medium, low score Three OFS categories: high, medium, low Two outcome types: same and different 3 * 3 * 2 = 18 result zones Each zone has assigned to it a specific strategy for moving toward a decision BJS/SEARCH, The National Consortium for Justice Information and Statistics 13

14 Transaction Controller, Stage 2 Closed Name Search (CNS) and Closed Fingerprint Search (CFS) cross-check stage- 1 results when ONS and OFS give different candidates Human verification provides final decisions in all zones originally Decisions-by-rule is available for some zones when/if CHS management deems it appropriate BJS/SEARCH, The National Consortium for Justice Information and Statistics 14

15 Transaction Controller, Stage 3 Update the NSS and AFIS and CH files, if appropriate Update the ecard and send to archive and the FBI s Integrated AFIS (IAFIS), if appropriate Update transaction record and send to analysis file Purge transaction record BJS/SEARCH, The National Consortium for Justice Information and Statistics 15

16 Name Search Server (NSS) Needed: A method that always delivers a single candidate is more accurate than most current name search methods can be adjusted in response to operational experience is statistically independent of the AFIS method BJS/SEARCH, The National Consortium for Justice Information and Statistics 16

17 NSS Characteristics No exclusion, only match-scoring Scoring based on Bayesian probability theory Self-evaluating to measure its own accuracy At least 1,000 times more computerintensive than older search methods BJS/SEARCH, The National Consortium for Justice Information and Statistics 17

18 NSS Mathematics R = Reliability, S = Selectivity, Raw Element Score = R/S Refined Element Score = INT (1000 * log (Raw Element Score)) Refined Row Score = SUM (Refined Element Scores) So A score of 6000 suggests that the candidate is a million times more likely to be a mate than a random candidate BJS/SEARCH, The National Consortium for Justice Information and Statistics 18

19 NSS Elements Last Name - initial and remainder First Name - initial and remainder Middle Name - initial and remainder Name Suffix Sex Race Birth- day, month, and year Social Security Number BJS/SEARCH, The National Consortium for Justice Information and Statistics 19

20 Name Search Provisional Scores LNI ca. 1000, LNR ca FNI ca. 1000, FNR ca MNI ca. 1000, MNR ca NS ca. 500 Sex ca. 200, Race ca. 200 Bday ca. 1500, Bmonth ca. 1000, Byear ca SOC ca BJS/SEARCH, The National Consortium for Justice Information and Statistics 20

21 Name File Flat file Single key = SID + Sequence One or more rows per SID Inquiry types = ONS, CNS Result always one row + score BJS/SEARCH, The National Consortium for Justice Information and Statistics 21

22 Conclusions about NSS NSS is ready for detail design It should be more accurate than present state of practice It will provide the needed manageability Risk factor: computational intensity BJS/SEARCH, The National Consortium for Justice Information and Statistics 22

23 Automated Fingerprint Identification System (AFIS) Capabilities needed: Open Fingerprint Search (OFS) yielding single candidate and score Closed Fingerprint Search yielding single candidate and score Substantial OFS workload increase Adequate problem reporting Ability to receive instructions from ITC and respond appropriately BJS/SEARCH, The National Consortium for Justice Information and Statistics 23

24 Analysis Module: Capabilities Calculate accuracy of name search, fingerprint search, and system Calculate revised values for R, S, element scores, name search category boundaries, fingerprint search category boundaries Calculate receipt-to-decision time for each ecard type Calculate ecard reject rates and causes Evaluate new strategies and tactics BJS/SEARCH, The National Consortium for Justice Information and Statistics 24

25 The Grand Summary A manageable CHS is a good thing A manageable CHS can begin with a manageable identification subsystem A manageable identification subsystem is being designed as we speak A manageable identification subsystem is scheduled to roll out in 2004 BJS/SEARCH, The National Consortium for Justice Information and Statistics 25

26 Seed Nurturing CHS agency heads could: Assign a person to track the pathfinder project and report to the management committee Assign a person to see how difficult it would be to isolate the identification function from the rest of the CHS software CHS management could: Launch a mini-project to get the name search detail design and test it Launch talks with an AFIS vendor BJS/SEARCH, The National Consortium for Justice Information and Statistics 26

27 Seed Nurturing (continued) CHS oversight staff could: Track the pathfinder project and consider briefing the oversight principals CHS audit staff could: Compare audit questions about timeliness, completeness, and accuracy to the pathfinder capabilities Consider endorsing implementation as part of system audit-ability BJS/SEARCH, The National Consortium for Justice Information and Statistics 27

28 Seed Nurturing (continued) AFIS decision makers could: Take the pathfinder concept to the AFIS user group Consider an in-afis transaction controller CHS software houses could: Consider an in-chs transaction controller Consider a Web-service name search service or a name search appliance BJS/SEARCH, The National Consortium for Justice Information and Statistics 28

29 Have a Question? Send your question by to webcast@search.org. We will respond by . We may provide your question and its answer to others, BUT all information concerning your name and organization will be stripped from the question and response, UNLESS you specifically request otherwise. BJS/SEARCH, The National Consortium for Justice Information and Statistics 29

30 Have a Comment or Suggestion? Send it by to webcast@search.org. We will acknowledge it by . If you use the subject line AGENCY COMMENT or AGENCY SUGGESTION, we will treat it as coming from the CHS agency head; otherwise, we will treat it as a personal comment or suggestion and will strip your name and affiliation. BJS/SEARCH, The National Consortium for Justice Information and Statistics 30

31 Acronym Glossary AFIS BJS CFS CHS CNS FIFO IAFIS ITC NIST NSS OFS ONS RES Automated Fingerprint Identification System Bureau of Justice Statistics Closed fingerprint search Criminal history system Closed name search First in, first, out Integrated Automated Fingerprint Identification System Identification transaction controller Internet Transfer Control National Institute of Standards and Training Name search service Open fingerprint search Open name search Reception and edit service BJS/SEARCH, The National Consortium for Justice Information and Statistics 31

32 This Concludes the Seminar We thank you for your time and attention. The Bureau of Justice Statistics, U.S. Department of Justice SEARCH, The National Consortium for Justice Information and Statistics Robert L. Marx BJS/SEARCH, The National Consortium for Justice Information and Statistics 32

I I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments:

I I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments: From: Sent: lleo.gov] arch 24, 2011 1:55 PM To: I Cc: le.gov Subject: White House Domestic Policy Request Attachments: NG[ Summary.pdf; IAQ Data Dictionary.pdf; IAQscreenshot.pdf Attached, please find

More information

Recommendation 20.1 & Manager Gordon Brussow ID Unit Forensic Division

Recommendation 20.1 & Manager Gordon Brussow ID Unit Forensic Division Recommendation 20.1 & 20.3 Manager Gordon Brussow ID Unit Forensic Division 20.1 The SFPD needs to develop reliable electronic in-custody arrest data. It needs to ensure that these arrest data accurately

More information

Judicial Inquiry System (JIS)

Judicial Inquiry System (JIS) Judicial Inquiry System (JIS) Active Warrant Alert Calendaring System (AWACS) User Manual Office of the State Courts Administrator Created March 5, 2018 Table of Contents ABOUT THIS DOCUMENT... 3 SCOPE...

More information

FBI Next Generation Identification (NGI)

FBI Next Generation Identification (NGI) FBI Next Generation Identification (NGI) Bigger, Better, Faster NGI - Overview for Strategic Planning July 2013 1 IAFIS Database Criminal History File 75.4 million subjects with over 284+ million arrest

More information

Mobile ID, the Size Compromise

Mobile ID, the Size Compromise Mobile ID, the Size Compromise Carl Gohringer, Strategic Business Development E-MOBIDIG Meeting, Bern, 25/26 September 1 Presentation Plan The quest for increased matching accuracy. Increased adoption

More information

CJIS Advisory Policy Board. Disposition Task Force. SEARCH 2011 Winter Membership Meeting

CJIS Advisory Policy Board. Disposition Task Force. SEARCH 2011 Winter Membership Meeting CJIS Advisory Policy Board Disposition Task Force 1 History The APB discussed the issue of incomplete records and the need to include courts in future discussions The APB recommended the formation of a

More information

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

Good morning, Chairman Harman, Ranking Member Reichert, and Members of Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,

More information

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2 IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated

More information

Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011

Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Presentation Topics Current and Future HIJIS Activities Background HIJIS Strategic Plan HIJIS Architecture Joins

More information

The NIH Collaboratory Distributed Research Network: A Privacy Protecting Method for Sharing Research Data Sets

The NIH Collaboratory Distributed Research Network: A Privacy Protecting Method for Sharing Research Data Sets The NIH Collaboratory Distributed Research Network: A Privacy Protecting Method for Sharing Research Data Sets Jeffrey Brown, Lesley Curtis, and Rich Platt June 13, 2014 Previously The NIH Collaboratory:

More information

Colorado Sex Offender Management Board (SOMB) INTENT TO APPLY. as a POLYGRAPH EXAMINER. for the Adult and Juvenile Provider List

Colorado Sex Offender Management Board (SOMB) INTENT TO APPLY. as a POLYGRAPH EXAMINER. for the Adult and Juvenile Provider List Colorado Sex Offender Management Board (SOMB) INTENT TO APPLY as a POLYGRAPH EXAMINER for the Adult and Juvenile Provider List Colorado Department of Public Safety Division of Criminal Justice Office of

More information

Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014

Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Note to Submitters: The information in this document is provided for you to use in any manner most appropriate

More information

NAVIGATION GUIDE FEDERAL REGISTRY. General Information

NAVIGATION GUIDE FEDERAL REGISTRY. General Information NAVIGATION GUIDE FEDERAL REGISTRY General Information Purpose This navigation guide is designed to provide institution and individual users with a general concept and navigation of NMLS. Copyright 2014

More information

EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND

EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND MARYLAND DEPARTMENT OF PUBLIC SAFETY AND CORRECTIONAL SERVICES INFORMATION TECHNOLOGY AND COMMUNICATIONS DIVISION FOR

More information

The Smart Campaign: Introducing Certification

The Smart Campaign: Introducing Certification The Smart Campaign: Introducing Certification Elisabeth Rhyne, Managing Director Center for Financial Inclusion at ACCION Responsible Finance Forum Washington, DC April, 2012 Introducing The Smart Campaign

More information

Guidelines for Capturing Palmprints and Supplementals

Guidelines for Capturing Palmprints and Supplementals Guidelines for Capturing Palmprints and Supplementals Guidelines for Capturing Palmprints and Supplementals General Overview: The FBI will implement palmprint and supplemental print search capabilities

More information

Smart Policing and Technology Applications

Smart Policing and Technology Applications Smart Policing and Technology Applications Presentation at the IACP LEIM Conference San Diego, California June 15,2011 This project was supported by Grant No. 2009-DG-BX-K021 awarded by the Bureau of Justice

More information

Judicial Inquiry System (JIS)

Judicial Inquiry System (JIS) Judicial Inquiry System (JIS) Jessica Lunsford Act (JLA) First Appearance Calendar User Manual Office of the State Courts Administrator Updated March 5, 2018 Table of Contents ABOUT THIS DOCUMENT... 3

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Minnesota Motor Registration Information Service (QMV) Published On: Feb 09, 2012 Service Release Version#: 1.0 Prepared

More information

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014 JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening

More information

Security Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015

Security Control Mapping of CJIS Security Policy Version 5.3 Requirements to NIST Special Publication Revision 4 4/1/2015 U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Security Control Mapping of CJIS Security Policy Version 5.3 s to NIST Special Publication 800-53

More information

COUNTY OF LOS ANGELES REQUEST FOR INFORMATION. RFI No. 414-SH MULTI-BIOMETRIC IDENTIFICATION SYSTEM

COUNTY OF LOS ANGELES REQUEST FOR INFORMATION. RFI No. 414-SH MULTI-BIOMETRIC IDENTIFICATION SYSTEM COUNTY OF LOS ANGELES REQUEST FOR INFORMATION RFI No. 414-SH MULTI-BIOMETRIC IDENTIFICATION SYSTEM RFI NO. 414-SH COUNTY OF LOS ANGELES SHERIFF S DEPARTMENT Request for Information (RFI) Project No. 414-SH

More information

Missouri State Highway Patrol. OCN Query Application. Detailed Requirements Specification Version 1.3

Missouri State Highway Patrol. OCN Query Application. Detailed Requirements Specification Version 1.3 Missouri State Highway Patrol OCN Query Application Detailed Requirements Specification Version 1.3 Table of Contents 1 Document Description... 6 1.1 Intent... 6 1.2 Executive Summary... 6 1.3 Overview...

More information

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto

More information

Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions

Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions Defense Manpower Data Center Personnel Security and Assurance Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions Version 1.4 March 1, 2017 Contract Number: GS00Q09BGD0027 Task Order:

More information

Technical Procedure for the SAFIS/AFIT

Technical Procedure for the SAFIS/AFIT Technical Procedure for the SAFIS/AFIT 1.0 Purpose - This procedure describes how to operate the State Automated Fingerprint Identification System/Advanced Fingerprint Identification Technology (SAFIS/AFIT).

More information

EDUCATOR. Certified. to know to become a. What you need. in Florida. General Certification. Requirements for. Individuals Applying

EDUCATOR. Certified. to know to become a. What you need. in Florida. General Certification. Requirements for. Individuals Applying What you need to know to become a Certified EDUCATOR in Florida General Certification Requirements for Individuals Applying for Initial Certification Beginning July 1, 2002 Bureau of Educator Certification

More information

SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004

SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 This document provides an overview of the program put into place by the South Carolina Law Enforcement Division (SLED)

More information

FBI Criminal History Record Certification Program

FBI Criminal History Record Certification Program FBI Criminal History Record Certification Program P. David Morgan Fingerprint Examiner Instructor Federal Bureau of Investigation Criminal Justice Information Services Division Biometric Services Section

More information

NGI and Rap Back Focus Group Briefing

NGI and Rap Back Focus Group Briefing NGI and Rap Back Focus Group Briefing 2012 SEARCH Annual Membership Group Meeting July 17-19 Brad Truitt Rachel Tucker John Kane 1 Introduction Welcome NGI Update Rap Back Overview/Update Rap Back Focus

More information

MFA DIGITAL FOUNDATIONS CERTIFICATION PROGRAM

MFA DIGITAL FOUNDATIONS CERTIFICATION PROGRAM MFA DIGITAL FOUNDATIONS CERTIFICATION PROGRAM FREQUENTLY ASKED QUESTIONS (FAQs) 1. What does the Certification cover? 2. Why do I need Certification? 3. Who developed the MFA Digital Foundations Certification

More information

Cape Breton- Victoria Regional School Board

Cape Breton- Victoria Regional School Board Cape Breton- Victoria Regional School Board APPLICATION PROCEDURE FOR SUBSTITUTE TEACHING Complete substitute application form and attach a photocopy of your valid Nova Scotia teaching license, along with

More information

Updated: 2014 January. Continuing Professional Education (CPE) Policy

Updated: 2014 January. Continuing Professional Education (CPE) Policy Updated: 2014 January Continuing Professional Education (CPE) Policy Table of Contents Overview... 2 CRISC Certification Requirements... 2 General Requirements Annual and Three-year Certification Period

More information

DNA Database Section Procedure. 2.0 Scope The procedures in this document apply to the DNA Database Section at the State Crime Laboratory.

DNA Database Section Procedure. 2.0 Scope The procedures in this document apply to the DNA Database Section at the State Crime Laboratory. DNA Database Section Procedure 1.0 Purpose To outline the procedures for the operation of the DNA Database Section. 2.0 Scope The procedures in this document apply to the DNA Database Section at the State

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

DLS DEF1437. Case 2:13-cv Document Filed in TXSD on 11/19/14 Page 1 of 10 USE CASE SPECIFICATION. 2:13-cv /02/2014

DLS DEF1437. Case 2:13-cv Document Filed in TXSD on 11/19/14 Page 1 of 10 USE CASE SPECIFICATION. 2:13-cv /02/2014 Case 2:13-cv-00193 Document 774-33 Filed in TXSD on 11/19/14 Page 1 of 10 An USE CASE SPECIFICATION ISSUE ELECTION CERTIFICATE Texas Department of Public Safety September 13 2013 Version 10 2:13-cv-193

More information

Risk Management FAQs NYSWYSA LPGA Drive Corning, NY 14830

Risk Management FAQs NYSWYSA LPGA Drive Corning, NY 14830 Risk Management FAQs 2016-17 NYSWYSA 11397 LPGA Drive Corning, NY 14830 Contents Policies and Procedures... 3 Purpose... 3 Who is Required to Have Risk Management?... 3 Minor Risk Management Process...

More information

Statewide Student Identifiers (SSIDs or SIDs)

Statewide Student Identifiers (SSIDs or SIDs) Statewide Student Identifiers (SSIDs or SIDs) Overview SSIDs, which are unique to the state of Ohio, are used for funding and tracking longitudinal student data. The SSID system provides a way for ODE

More information

Integrating Complex Regional Information Sharing Programs

Integrating Complex Regional Information Sharing Programs Integrating Complex Regional Information Sharing Programs in the National Capital Region Dave Russell Fairfax County, VA Police 1 st Sgt Ross Randlett Prince William County, VA Police Captain Mitch Cunningham

More information

Florida Agency for Health Care Administration Auditor General IT Operational Audit (Report No ) Six-Month Status Report as of July 11, 2017

Florida Agency for Health Care Administration Auditor General IT Operational Audit (Report No ) Six-Month Status Report as of July 11, 2017 Six-Month Status Report Finding #1 Recommendation Previous Management Information Security Program Plan. The Agency s Information Technology Security Plan needs improvement to provide for comprehensive

More information

The Business Value of Metadata for Data Governance: The Challenge of Integrating Packaged Applications

The Business Value of Metadata for Data Governance: The Challenge of Integrating Packaged Applications The Business Value of Metadata for Data Governance: The Challenge of Integrating Packaged Applications By Donna Burbank Managing Director, Global Data Strategy, Ltd www.globaldatastrategy.com Sponsored

More information

Biometric Offender Movement

Biometric Offender Movement Biometric Offender Movement Case Study Northern Ireland Prison Service CTA 2011 Patricia O Hagan, CEO Edward Hanna, Technical Director Agenda Background Northern Ireland Prison Service (NIPS) biometric

More information

Audit and Compliance Committee - Agenda

Audit and Compliance Committee - Agenda Audit and Compliance Committee - Agenda Board of Trustees Audit and Compliance Committee April 17, 2018, 1:30 2:30 p.m. President s Board Room Conference Call-In Phone #1-800-442-5794, passcode 463796

More information

Texas Department of Family and Protective Services

Texas Department of Family and Protective Services Texas Department of Family and Protective Services Automated Background Check System (ABCS) User Guide Updated April 2018 Table of Contents DFPS AUTOMATED BACKGROUND CHECK SYSTEM (ABCS) USER MANUAL Summary

More information

Address: 730 Simms, Suite #109, Golden, CO Digital Government: Government to Citizen (G to C)*

Address: 730 Simms, Suite #109, Golden, CO Digital Government: Government to Citizen (G to C)* NASCIO Nomination Form Title of Nomination: Colorado Integrated Criminal Justice Information System (CICJIS) Project/System Manager: Theresa Brandorff Job Title: Agency: Chief Information Officer Colorado

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

New Spanish Regulation Tightens Up Data Protection Requirements RAFI AZIM-KHAN, JOHN NICHOLSON, ALESSANDRO LIOTTA, AND DOMINIC HODGKINSON

New Spanish Regulation Tightens Up Data Protection Requirements RAFI AZIM-KHAN, JOHN NICHOLSON, ALESSANDRO LIOTTA, AND DOMINIC HODGKINSON New Spanish Regulation Tightens Up Data Protection Requirements RAFI AZIM-KHAN, JOHN NICHOLSON, ALESSANDRO LIOTTA, AND DOMINIC HODGKINSON The Spanish government has enacted a new regulation that further

More information

Texas Department of Family and Protective Services

Texas Department of Family and Protective Services Texas Department of Family and Protective Services Automated Background Check System (ABCS) User Guide Updated November 2016 Table of Contents DFPS AUTOMATED BACKGROUND CHECK SYSTEM (ABCS) USER MANUAL

More information

Judiciary Judicial Information Systems

Judiciary Judicial Information Systems Audit Report Judiciary Judicial Information Systems August 2016 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY For further information concerning this report

More information

MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS

MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS The purpose of this document is to establish and enforce Security Control of the access

More information

Pennsylvania Certification by Endorsement

Pennsylvania Certification by Endorsement Pennsylvania Certification by Endorsement Thank you for your interest in obtaining Pennsylvania EMS Certification by Endorsement. This is the process whereby a person certified by a state other than Pennsylvania

More information

JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION

JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION PRESENTED BY: Leon Frederick, CIO, Iowa Department of Public Safety Liz Pearson, URL Integration PRESENTATION OVERVIEW What is N-DEx? What is Iowa

More information

Matching Performance for the US-VISIT IDENT System Using Flat Fingerprints NISTIR C. L. Wilson, M. D. Garris, & C. I. Watson

Matching Performance for the US-VISIT IDENT System Using Flat Fingerprints NISTIR C. L. Wilson, M. D. Garris, & C. I. Watson Matching Performance for the US-VISIT IDENT System Using Flat Fingerprints NISTIR 7110 C. L. Wilson, M. D. Garris, & C. I. Watson MAY 2004 Matching Performance for the US-VISIT IDENT System Using Flat

More information

Thomas Jefferson University College of Nursing Undergraduate BSN Programs Center City & Abington-Dixon Campuses Pre-matriculation Completion Guide

Thomas Jefferson University College of Nursing Undergraduate BSN Programs Center City & Abington-Dixon Campuses Pre-matriculation Completion Guide Thomas Jefferson University College of Nursing Undergraduate BSN Programs Center City & Abington-Dixon Campuses Pre-matriculation Completion Guide Part I: Placing your order in Complio Pre-Step A Navigate

More information

Data Protection Policy

Data Protection Policy Introduction In order to; provide education, training, assessment and qualifications to its customers and clients, promote its services, maintain its own accounts and records and support and manage its

More information

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.

More information

Federal Bureau of Investigation CJIS Division Next Generation Identification

Federal Bureau of Investigation CJIS Division Next Generation Identification Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment

More information

ICS-ACI Policy Series

ICS-ACI Policy Series ICS-ACI Policy Series This is part of a series of documents that make up the formal policies adopted by the Institute for CyberScience at the Pennsylvania State University. Last Updated: September 5, 2017

More information

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements

More information

Federal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011

Federal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011 Federal Continuous Monitoring Working Group March 21, 2011 DOJ Cybersecurity Conference 2/8/2011 4/12/2011 Why Continuous Monitoring? Case for Change Strategy Future State Current State Current State Case

More information

Advisory Commission on the Administration of Justice April 19, Julie Butler Division Administrator. Dedication, Pride, Service

Advisory Commission on the Administration of Justice April 19, Julie Butler Division Administrator. Dedication, Pride, Service Advisory Commission on the Administration of Justice Julie Butler Division Administrator Dedication, Pride, Service Statutory Authority Housed within the General Services Division of DPS (NRS 480.130,

More information

Texas Department of Public Safety Crime Records Service. FACT Clearinghouse User Guide

Texas Department of Public Safety Crime Records Service. FACT Clearinghouse User Guide Texas Department of Public Safety Crime Records Service FACT Clearinghouse User Guide July 2016 Contents Introduction... 3 Signing In... 3 Worklists... 3 Accessing the Worklist... 4 List of Applicants...

More information

Registry Provider/Recipient Eligibility and Complaint Policy

Registry Provider/Recipient Eligibility and Complaint Policy Purpose: To clearly define the application requirements, causes for exemption, causes for removal, complaint process and appeals process for In-Home Supportive Services (IHSS) Registry Providers and Recipients.

More information

Biometric Center of Excellence (BCOE)

Biometric Center of Excellence (BCOE) Federal Bureau of Investigation Science & Technology Branch Criminal Justice Information Services Division Biometric Center of Excellence (BCOE) International Association for Identification 100 Year -

More information

Care Provider Background Screening Clearinghouse

Care Provider Background Screening Clearinghouse Care Provider Background Screening Clearinghouse Clearinghouse Renewal Instruction Guide Updated October 2017 Page 1 of 15 Contents Contents... 2 Clearinghouse Renewal Overview... 3 Background Screening

More information

FinFit will request and collect information in order to determine whether you qualify for FinFit Loans*.

FinFit will request and collect information in order to determine whether you qualify for FinFit Loans*. FinFit Web Privacy Policy General: This Privacy Policy ( Policy ) describes the ways FinFit, LLC ( FinFit, we, us) collects, stores, uses and protects information we receive from you or that you may provide

More information

Istisna Creation Oracle FLEXCUBE Universal Banking Release [May] [2011] Oracle Part Number E

Istisna Creation Oracle FLEXCUBE Universal Banking Release [May] [2011] Oracle Part Number E Istisna Creation Oracle FLEXCUBE Universal Banking Release 11.3.0 [May] [2011] Oracle Part Number E51511-01 Table of Contents Origination of Istisna 1. ISTISNA ORIGINATION... 1-1 1.1 INTRODUCTION... 1-1

More information

The Honorable Porter J. Goss Chairman, Permanent Select Committee on Intelligence House of Representatives

The Honorable Porter J. Goss Chairman, Permanent Select Committee on Intelligence House of Representatives United States General Accounting Office Washington, DC 20548 November 14, 2003 The Honorable Porter J. Goss Chairman, Permanent Select Committee on Intelligence House of Representatives The Honorable Nancy

More information

Coordination, Collaboration and Integration: Canada s National Crime Prevention Strategy

Coordination, Collaboration and Integration: Canada s National Crime Prevention Strategy Coordination, Collaboration and Integration: The Major Challenges of the 21 st Century Coordination, Collaboration and Integration: Canada s National Crime Prevention Strategy XII ICPC Colloquium November

More information

Next Generation Identification Rap Back Services

Next Generation Identification Rap Back Services Next Generation Identification Rap Back Services Presented by: Jimmy Mills Management and Program Analyst Rap Back Services Team Theresa Yarboro Management and Program Analyst Rap Back Services Team 1

More information

Communications Management Plan Template

Communications Management Plan Template Communications Management Plan Template Project Name: U.S. Department of Housing and Urban Development October, 2010 Communications Management Plan Template (V1.0) VERSION HISTORY [Provide information

More information

RFQ OIT-1 Q&A. Questions and Answers, in the order received.

RFQ OIT-1 Q&A. Questions and Answers, in the order received. Question Does the system have an existing SSP? Do they use a system like Xacta or CSAM to generate the SSP. Will they provide us the current POAM list? Will they provide scanning tools or we have to bring

More information

Administrative Directive No. 4: 2011 Continuing Professional Education Requirements for All Certification Programs

Administrative Directive No. 4: 2011 Continuing Professional Education Requirements for All Certification Programs Administrative Directive No. 4: 2011 Continuing Professional Education Requirements for All Certification Programs Purpose This document contains the mandatory Continuing Professional Education (CPE) requirements

More information

Technical Trust Policy

Technical Trust Policy Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality

More information

BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA

BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA AGENDA TOPICS Overview of MNJIS Product Managers Role and Purpose Information

More information

Connect To Home Eastern PA CoC Coordinated Entry System HMIS Guide

Connect To Home Eastern PA CoC Coordinated Entry System HMIS Guide Connect To Home Eastern PA CoC Coordinated Entry System HMIS Guide Updated: February 2018 1 P a g e Table of Contents Introduction... 4 Training Class... 4 Workgroup... 4 Coordinated Entry Process... 4

More information

THE DEPARTMENT OF JUSTICE BUREAU OF CRIMINAL IDENTIFICATION AND INFORMATION APPLICANT PROCESSING PROGRAM LIVE SCAN REQUEST PACKET

THE DEPARTMENT OF JUSTICE BUREAU OF CRIMINAL IDENTIFICATION AND INFORMATION APPLICANT PROCESSING PROGRAM LIVE SCAN REQUEST PACKET THE DEPARTMENT OF JUSTICE BUREAU OF CRIMINAL IDENTIFICATION AND INFORMATION APPLICANT PROCESSING PROGRAM LIVE SCAN REQUEST PACKET DEPARTMENT OF JUSTICE BUREAU OF CRIMINAL IDENTIFICATION AND INFORMATION

More information

Information Security Incident Response and Reporting

Information Security Incident Response and Reporting Information Security Incident Response and Reporting Original Implementation: July 24, 2018 Last Revision: None This policy governs the actions required for reporting or responding to information security

More information

COST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process

COST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process COST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process Whitepaper by: Steve Rafferty - Founder/CEO ActiveProspect Running a Cost Per Lead advertising campaign seems

More information

B. EXECUTIVE SUMMARY. Page 2 of 7

B. EXECUTIVE SUMMARY. Page 2 of 7 B. EXECUTIVE SUMMARY The New York State Division of Criminal Justice Services (DCJS) takes New York s Governor David A. Paterson s comment -- More and more citizens and businesses rely on technology to

More information

Western Identification Network Service Strategy (January, 2008)

Western Identification Network Service Strategy (January, 2008) Western Identification Network Service Strategy (January, 2008) The purpose of this paper is to help members and other interested parties understand the unique nature of services provided by WIN that no

More information

Introduction. October 2017

Introduction. October 2017 BRAD TRUITT Chair TIMOTHY LOTT Interim Executive Director October 2017 Introduction SEARCH recently conducted an informal survey 1 of its Membership Group to gain a better understanding of how CJIS Systems

More information

JMS User. Version

JMS User. Version JMS User Version 11.4.0.600 Table of Contents Booking Menu... 5 Inmate Booking: Person... 5 Projected Release Date... 6 Gangs... 6 Pre-Book... 6 Biometric... 6 ID # Search... 7 Detail Search... 7 Clear...

More information

Bureau of Justice Statistics (BJS) - Law Enforcement law enforcement in a new century and a changing world improving the administration of.

Bureau of Justice Statistics (BJS) - Law Enforcement law enforcement in a new century and a changing world improving the administration of. DOWNLOAD OR READ : LAW ENFORCEMENT IN A NEW CENTURY AND A CHANGING WORLD IMPROVING THE ADMINISTRATION OF FEDERAL LAW ENFORCEMENT REPORT OF THE COMMISSION ON THE ADVANCEMENT OF FEDERAL LAW ENFORCEMENT IMPROVING

More information

Ministry of Government and Consumer Services. ServiceOntario. Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report

Ministry of Government and Consumer Services. ServiceOntario. Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report Chapter 3 Section 3.06 Ministry of Government and Consumer Services ServiceOntario Standing Committee on Public Accounts Follow-Up on Section 4.09, 2015 Annual Report In March 2016, the Committee held

More information

Crime Reporting in the Age of Technology

Crime Reporting in the Age of Technology Crime Reporting in the Age of Technology Jan M. Chaiken Bureau of Justice Statistics U.S. Department of Justice June 14, 2000 Developments reflect efforts of many people in the Justice Department Federal

More information

Applied Coursework. Technology for Homeland Security Course Paper. Author: David Heller Cohort 0801/0802. Lead Instructor: Richard Bergin

Applied Coursework. Technology for Homeland Security Course Paper. Author: David Heller Cohort 0801/0802. Lead Instructor: Richard Bergin Applied Coursework Technology for Homeland Security Course Paper Author: David Heller Cohort 0801/0802 Lead Instructor: Richard Bergin The Nation s Homeland Security Educator Learn more about the CHDS

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

Department of Public Safety and Correctional Services Information Technology and Communications Division

Department of Public Safety and Correctional Services Information Technology and Communications Division Audit Report Department of Public Safety and Correctional Services Information Technology and Communications Division January 2016 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND

More information

Certified Recovery Peer Advocate Application

Certified Recovery Peer Advocate Application Certified Recovery Peer Advocate Application A Project of Alcoholism & Substance Abuse Providers of New York State, Inc. 11 North Pearl Street, Suite 801 Albany, NY 12207 Phone: 518.426.3122 x 101 Candidate

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Sonoma County s System-wide Efforts to Improve the Broader Criminal Justice System

Sonoma County s System-wide Efforts to Improve the Broader Criminal Justice System Sonoma County s System-wide Efforts to Improve the Broader Criminal Justice System Jennifer Murray, Deputy County Administrator Tom Schwedhelm, Santa Rosa Chief of Police Robert Ochs, Chief Probation Officer

More information

RHY Data Completeness - Data Quality Report User Guide Operating Year October 1, 2017 to September 30, 2018

RHY Data Completeness - Data Quality Report User Guide Operating Year October 1, 2017 to September 30, 2018 RHY Data Completeness - Data Quality Report User Guide Operating Year October 1, 2017 to September 30, 2018 Contents 1. INTRODUCTION...2 2. DESCRIPTION AND LAYOUT...2 2.1 Tab A Project Descriptor Summary...3

More information

RFQ OIT-1 Q&A. Questions and Answers, in the order received.

RFQ OIT-1 Q&A. Questions and Answers, in the order received. Question Does the system have an existing SSP? Do they use a system like Xacta or CSAM to generate the SSP. Will they provide us the current POAM list? Will they provide scanning tools or we have to bring

More information

Enterprise GRC Implementation

Enterprise GRC Implementation Enterprise GRC Implementation Our journey so far implementation observations and learning points Derek Walker Corporate Risk Manager National Grid 1 Introduction to National Grid One of the world s largest

More information

1998 Issue Number 2. From the Inkpad to the Mousepad: IAFIS and Fingerprint Technology at the Dawn of the 21 st Century

1998 Issue Number 2. From the Inkpad to the Mousepad: IAFIS and Fingerprint Technology at the Dawn of the 21 st Century Technical Bulletin featuring emerging technologies in criminal justice information management 1998 Issue Number 2 From the Inkpad to the Mousepad: IAFIS and Fingerprint Technology at the Dawn of the 21

More information

Online Batch Services

Online Batch Services Online Batch Services LexisNexis has enhanced its batch services to allow more user-friendly functionality for uploading batches and mapping layouts. Users sign in to the main product to access the online

More information

NSI. Suspicious Activity Reporting Line Officer Training

NSI. Suspicious Activity Reporting Line Officer Training Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding

More information

Identity Theft Victim s Complaint and Affidavit

Identity Theft Victim s Complaint and Affidavit Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors

More information

OPD PRESS/PUBLIC COMMENT/LEGISLATIVE/GUBERNATORIAL/ COMMENT POLICY (rev )

OPD PRESS/PUBLIC COMMENT/LEGISLATIVE/GUBERNATORIAL/ COMMENT POLICY (rev ) OPD PRESS/PUBLIC COMMENT/LEGISLATIVE/GUBERNATORIAL/ COMMENT POLICY (rev. 1-2017) I. MEDIA CONTACTS A. OPD Employees Need Advance Approval Before Making Public Statements or Responding to Media Requests

More information