Final Report Cost Analysis of Entry- Exit & Registered Traveller Systems

Size: px
Start display at page:

Download "Final Report Cost Analysis of Entry- Exit & Registered Traveller Systems"

Transcription

1 European Commission DG Justice, Freedom and Security Framework Contract Quality Assurance JLSB Service Order: so 30 EntryExit Costing Study Final Report Cost Analysis of Entry Exit & Registered Traveller Systems (CBESO30REP003) Abstract This document is the Final Report of the cost analysis of the EntryExit and Registered Traveller Systems Document information AUTHOR Unisys OWNER ISSUE DATE VERSION 1.30 APPROVAL STATUS Document History VER DATE AUTHOR DESCRIPTION ACTION* PG /01/10 Huijgens Initial draft /02/10 Huijgens Tavano Updated based on feedback from COM. Identified scenarios and described the methodology /02/10 Tavano Revised text, tables, pictures /02/10 Tavano Updated based on feedback from COM /03/10 Huijgens Tavano European Commission DG JLS Submitted Revised text, tables, pictures. Updated based on feedback from COM /03/10 Huijgens Revised text, tables, pictures /03/10 Huijgens Revised text, tables, pictures /03/10 Huijgens, Dalamanga, Wiersma /03/10 Huijgens, Dalamanga, Wiersma I U IR IR IR IR IR All All All All All All Final version IR All Final version addressing COM comments IR All, Printed 4/25/2012, p. 1/137

2 Final Report Cost Analysis of EntryExit & Registered Traveller Systems VER DATE AUTHOR DESCRIPTION ACTION* PG /03/10 Huijgens, Dalamanga, Wiersma Final version IR All /04/10 Huijgens Final version, removed disclaimer Changed Semi Automated to SemiManual Action: I = Insert, R = Replace R 3 Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 2/137

3 Final Report Cost Analysis of EntryExit & Registered Traveller Systems Contents 1 EXECUTIVE SUMMARY 7 2 INTRODUCTION 10 3 METHODOLOGY AND COST ANALYSIS STRUCTURE IDENTIFYING THE COST ELEMENTS TOOLS The Cost Model Function Point Analysis CostXpert Infrastructure Design and Sizing Accuracy 14 4 USE CASES THIRD COUNTRY NATIONAL BORDER CROSSING ENTRY THIRD COUNTRY NATIONAL BORDER CROSSING EXIT REGISTERED TRAVELLER BORDER CROSSING ENTRY REGISTERED TRAVELLER BORDER CROSSING EXIT REGISTERED TRAVELLER ENROLMENT DATA DICTIONARY TABLE OF INTERFACES 35 5 ASSUMPTIONS FOR SYSTEM AND COST MODELS GENERAL ASSUMPTIONS ANTICIPATED SYSTEM LOAD SYSTEM MODEL PARAMETERS AND ASSUMPTIONS 38 6 SYSTEMS ARCHITECTURE CENTRALISED SYSTEM ARCHITECTURE Member State Technical Infrastructure Central Technical Infrastructure DISTRIBUTED SYSTEM ARCHITECTURE Member State Distributed Technical Architecture 53 7 COST ANALYSIS HOW TO USE THE EXCEL COST MODEL Input Presentation Sizing Estimating costs using the Model COST ANALYSIS PRESENTATION Cost elements Costs General Remarks CENTRALISED SYSTEM ARCHITECTURE A1C CENTRALISED ENTRYEXIT SYSTEM, NO BIOMETRICS Scenario Parameters Cost Summary Tables A1D DISTRIBUTED ENTRYEXIT SYSTEM, NO BIOMETRICS Scenario Parameters Cost Summary Tables 69 Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 3/137

4 Final Report Cost Analysis of EntryExit & Registered Traveller Systems 7.6 A2C CENTRALISED ENTRYEXIT SYSTEM, WITH BIOMETRICS Scenario Parameters Cost Summary Tables A2D DISTRIBUTED ENTRYEXIT SYSTEM, WITH BIOMETRICS Scenario Parameters Cost Summary Tables A3C CENTRALISED ENTRYEXIT SYSTEM, BIOMETRICS ADDED LATER Scenario Parameters Cost Summary Tables A3D DISTRIBUTED ENTRYEXIT SYSTEM, BIOMETRICS ADDED LATER Scenario Parameters Cost Summary Tables B0 TOKENBASED RTS ONLY Scenario Parameters Cost Summary Tables B1C TOKENBASED RTS AND CENTRALISED ENTRYEXIT SYSTEM WITHOUT BIOMETRICS Scenario Parameters Cost Summary Tables B1D TOKENBASED RTS AND DISTRIBUTED ENTRYEXIT SYSTEM WITHOUT BIOMETRICS Scenario Parameters Cost Summary Tables B2C TOKENBASED RTS AND CENTRALISED ENTRYEXIT SYSTEM WITH BIOMETRICS Scenario Parameters Cost Summary Tables B2D TOKENBASED RTS AND DISTRIBUTED ENTRYEXIT SYSTEM WITH BIOMETRICS Scenario Parameters Cost Summary Tables B3C TOKENBASED RTS AND CENTRALISED ENTRYEXIT SYSTEM WITH BIOMETRICS ADDED LATER Scenario Parameters Cost Summary Tables B3D TOKENBASED RTS AND DISTRIBUTED ENTRYEXIT SYSTEM WITH BIOMETRICS ADDED LATER Scenario Parameters Cost Summary Tables C0 TOKENLESS RTS ONLY Scenario Parameters Cost Summary Tables C1C TOKENLESS RTS AND CENTRALISED ENTRYEXIT SYSTEM WITHOUT BIOMETRICS Scenario Parameters Cost Summary Tables C1D TOKENLESS RTS AND DISTRIBUTED ENTRYEXIT SYSTEM WITHOUT BIOMETRICS Scenario Parameters Cost Summary Tables C2C TOKENLESS RTS AND CENTRALISED ENTRYEXIT SYSTEM WITH BIOMETRICS Scenario Parameters Cost Summary Tables C2D TOKENLESS RTS AND DISTRIBUTED ENTRYEXIT SYSTEM WITH BIOMETRICS 116 Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 4/137

5 Final Report Cost Analysis of EntryExit & Registered Traveller Systems Scenario Parameters Cost Summary Tables C3C TOKENLESS RTS AND CENTRALISED ENTRYEXIT SYSTEM WITH BIOMETRICS ADDED LATER Scenario Parameters Cost Summary Tables C3D TOKENLESS RTS AND DISTRIBUTED ENTRYEXIT SYSTEM WITH BIOMETRICS ADDED LATER Scenario Parameters Cost Summary Tables SUMMARY TABLE COMPARISON OF THE COSTS FOR VIS COLOCATION (NO VIS CONNECTION) COMPARISON OF THE COSTS FOR VIS CONNECTION REFERENCE AND APPLICABLE DOCUMENTS APPLICABLE DOCUMENTS REFERENCE DOCUMENTS TERMINOLOGY AND ANNEXES ACRONYMS & ABBREVIATIONS ANNEX 1 COST MODEL BUILDING BLOCKS ANNEX 2 COST XPERT INPUT REPORTS 137 Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 5/137

6 Final Report Cost Analysis of EntryExit & Registered Traveller Systems Tables Table 1: Comparison of the costs VIS colocation (no VIS connection)... 8 Table 2: Comparison of costs VIS colocation... 9 Table 3: Costing Scenarios...10 Table 4: Cost Items vs. Solution Scenarios...11 Table 5: EES Anticipated System load...37 Table 6: RTS Anticipated System load...38 Table 7: Business parameters...38 Table 8: Cost Parameters...39 Table 9: Member State Technical Architecture Building Blocks...44 Table 10: Central Infrastructure Building Blocks...47 Table 11: Central System Building Blocks...51 Table 12: Distributed architecture building blocks...54 Table 13: Cost elements...61 Table 14: Cost parameters...61 Table 15: Example of MS Administrative Costs...64 Table 15: Comparison of the costs VIS colocation (no VIS connection) Table 16: Comparison of costs VIS connection Table 17: Applicable Documents Table 18: Reference Documents Table 19: Acronyms & Abbreviations Figures Figure 1: Spreadsheet Costing Workbook Structure...13 Figure 2: TCN Border Crossing Systems Map Entry...16 Figure 3: TCN Border Crossing Systems Map Exit...20 Figure 4: RT Border Crossing Systems Map Entry...23 Figure 5: RT Border Crossing Systems Map Exit...27 Figure 6: RT Enrolment...30 Figure 7: Centralised System Architecture...42 Figure 8: Member State Technical Architecture...44 Figure 9: Central Technical Architecture...47 Figure 10: Collaboration architecture...50 Figure 11: Base distributed system architecture...50 Figure 12: Central RTS system in distributed architecture...51 Figure 13: Member State distributed architecture...54 Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 6/137

7 Final Report Cost Analysis of EntryExit & Registered Traveller Systems 1 EXECUTIVE SUMMARY The objective of this study was to carry out a thorough assessment of the costs connected to establishing an Entry/Exit System and a Registered Traveller System taking into account the various options and suboptions identified during the preparation of the legal proposals of the two systems. The study complements the Impact Assessments accompanying those proposals. The study was carried out based on the details in this document and, to a limited extent, on the Entry Exit Feasibility Study Final report 1. All cost estimates have been based on the documentary material provided by COM and the SPECIFICATIONS FOR A COST ANALYSIS STUDY as reported in the document _EES_RT_IA_Cost_ToR_lang. To correctly estimate the costs, various techniques were used: Sizing o Hardware sizing based on simplified process models from the Feasibility Study and forecasted numbers of Entries/Exits and RT travel events. o Software development sizing based on information in the Feasibility Study and completed with Function Point Analysis when necessary. o Network sizing based on predictions of the eventual expected system load Costing o Parametric cost analysis techniques were used to estimate development efforts and maintenance costs to support the introduction of a new software product. o Parametric cost estimation is based on the functional size of the solution, the level of reusability of existing products and the proportion of COTS products that are used. Obvious parameters are the hourly rates and skill levels of the development team at specified reference rates. Less obvious parameters are associated with the development environment and project governance. The parameters that we propose to use for the estimations have been discussed and agreed with the COM. o Estimates of the costs of third party hardware, software and network products were based on list prices of popular and appropriate COTS products. o For estimating operational costs, we assumed a harmonised model, in which we adopted the rates given in the specifications as average rates to be used across Member States. We also assumed the same business hours throughout the Union, as well as the same number of holidays. Planning o The initial planning was produced by the parametric costing tool (CostXpert). This includes specification, design, realisation, testing and implementation and the first phase of deployment, where any defects have been detected. o The manual intervention and adjustments of the schedule is necessary, as CostXpert assumes unlimited resources to be available, which means that the planning needs to be adjusted to make it fit the actual situation. Two basic architectures have been considered: Central architecture Distributed (fullmeshed) architecture. In addition to the above considerations, other features considered were the existence or not of a Registered Traveller System. Based on the analysis presented in the current study, the following tables present a summary of the costs for the different scenarios and for the two variables considered (colocation with VIS, VIS connection): 1 CAB38FR004, Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 7/137

8 Final Report Cost Analysis of EntryExit & Registered Traveller Systems Table 1: Comparison of the costs VIS colocation (no VIS connection) Scenario, no VIS connection A1C Central EES no biometrics, no RTS, not connected to VIS, colocated with VIS, 5 year retention EU onetime costs MS onetime Costs EU in 2014 MS in 2014 EU in 2020 MS in ,028, ,216,654 6,202, ,063,562 6,467, ,626,820 A2C Central EES with biometrics, no RTS, not connected to VIS, colocated with VIS, 5 year retention 27,543, ,948,404 (3,335,536) 125,568,865 7,652, ,457,900 A3C Central EES with biometrics added later, no RTS, not connected to VIS, colocated with VIS, 5 year retention B0 TokenBased RTS, No EES, not connected to VIS, colocated with VIS, 5 year retention B1C TokenBased RTS, EES no biometrics, not connected to VIS, colocated with VIS, 5 year retention B2C TokenBased RTS, EES with biometrics, not connected to VIS, colocated with VIS, 5 year retention B3C TokenBased RTS, EES with biometrics added later, not connected to VIS, colocated with VIS, 5 year retention C0 TokenLess RTS, No EES, not connected to VIS, colocated with VIS, 5 year retention C1C TokenLess RTS, EES no biometrics, not connected to VIS, colocated with VIS, 5 year retention C2C TokenLess RTS, EES with biometrics, not connected to VIS, colocated with VIS, 5 year retention C3C TokenLess RTS, EES with biometrics added later, not connected to VIS, colocated with VIS, 5 year retention A1D Distributed EES no biometrics, no RTS, not connected to VIS, colocated with VIS, 5 year retention 27,790, ,491,869 (3,304,561) 125,516,924 7,683, ,405,959 21,028, ,216,654 6,202, ,063,562 6,467, ,626,820 25,042, ,809,796 6,633, ,293,997 6,897, ,857,255 34,686, ,186,811 (1,555,916) 129,580,236 8,260, ,773,514 34,940, ,763,172 (1,530,520) 129,537,872 8,285, ,731,150 30,255, ,713,446 (149,470) 129,367,775 11,006, ,787,550 34,454, ,635,674 (1,577,548) 129,625,122 8,175, ,018,098 34,454, ,641,325 (1,577,548) 129,865,124 7,790, ,377,884 34,719, ,198,498 (1,551,003) 129,820,841 7,816, ,333,601 13,320, ,488,995 4,755, ,907,808 4,979, ,338,725 A2D Distributed EES with biometrics, no RTS, not connected to VIS, colocated with VIS, 5 year retention 17,315, ,570,976 5,276, ,376,886 5,457, ,171,805 A3D Distributed EES with biometrics added later, no RTS, not connected to VIS, colocated with VIS, 5 year retention 17,884, ,425,584 5,333, ,262,347 5,457, ,171,805 Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 8/137

9 Final Report Cost Analysis of EntryExit & Registered Traveller Systems Scenario, with VIS connection A1C Central EES no biometrics, no RTS, connected to VIS, colocated with VIS, 5 year retention Table 2: Comparison of costs VIS colocation EU onetime costs MS onetime Costs EU in 2014 MS in 2014 EU in 2020 MS in ,708, ,508,919 4,548, ,969,552 6,549, ,841,787 A2C Central EES with biometrics, no RTS, connected to VIS, colocated with VIS, 5 year retention 27,477, ,948,404 (3,391,917) 125,568,865 7,538, ,457,900 A3C Central EES with biometrics added later, no RTS, connected to VIS, colocated with VIS, 5 year retention B0 TokenBased RTS, No EES, connected to VIS, colocated with VIS, 5 year retention 27,724, ,491,869 (3,360,942) 125,516,924 7,569, ,405,959 20,984, ,216,654 6,148, ,063,562 6,420, ,626,820 B1C TokenBased RTS, EES no biometrics, connected to VIS, colocated with VIS, 5 year retention 24,998, ,809,796 6,578, ,293,997 6,850, ,857,255 B2C TokenBased RTS, EES with biometrics, connected to VIS, colocated with VIS, 5 year retention B3C TokenBased RTS, EES with biometrics added later, connected to VIS, colocated with VIS, 5 year retention C0 TokenLess RTS, No EES, connected to VIS, colocated with VIS, 5 year retention C1C TokenLess RTS, EES no biometrics, connected to VIS, colocated with VIS, 5 year retention 34,627, ,186,811 (1,613,234) 129,580,236 8,146, ,773,514 34,881, ,763,172 (1,587,839) 129,537,872 8,172, ,731,150 30,207, ,713,446 (232,510) 129,367,775 10,651, ,787,550 34,395, ,635,674 (1,635,336) 129,625,122 8,062, ,018,098 C2C TokenLess RTS, EES with biometrics, connected to VIS, colocated with VIS, 5 year retention 34,395, ,641,325 (1,635,336) 129,865,124 7,677, ,377,884 C3C TokenLess RTS, EES with biometrics added later, connected to VIS, colocated with VIS, 5 year retention A1D Distributed EES no biometrics, no RTS, connected to VIS, colocated with VIS, 5 year retention A2D Distributed EES with biometrics, no RTS, connected to VIS, colocated with VIS, 5 year retention A3D Distributed EES with biometrics added later, no RTS, connected to VIS, colocated with VIS, 5 year retention 34,660, ,198,498 (1,608,790) 129,820,841 7,703, ,333,601 13,276, ,488,995 4,724, ,907,808 4,932, ,338,725 17,271, ,570,976 5,245, ,376,886 5,410, ,171,805 17,840, ,425,584 5,302, ,262,347 5,410, ,171,805 Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 9/137

10 Final Report Cost Analysis of EntryExit & Registered Traveller Systems 2 INTRODUCTION Table 3 contains the identifications of all costing scenarios that are described in this document. For easy navigation, the references to the scenarios contain hyper links to the relevant sections. Table 3: Costing Scenarios EE No/Biometrics EE w/biometrics EE Later/Biometrics No EE Central Distributed Central Distributed Central Distributed No RTS N/A A1C A1D A2C A2D A3C A3D RTS Token Based RTS Tokenless 2 B0 B1C B1D B2C B2D B3C B3D C0 C1C C1D C2C C2D C3C C3D As described in the Terms of Reference [R1] document, the costs for the EntryExit System (EES) are estimated in two forms; as a centralised system with national interfaces and as a distributed system with a consultation mechanism active between Member States. These scenarios end up being remarkably different from a technical standpoint, making it appropriate to identify them as two separate alternatives, whereby 20 alternative scenarios are defined and analysed in total. 2 The tokenless and tokenbased Registered Traveller systems refer to centralised systems that serve all the Member States. Only the EES can be either centralised or distributed architecture. Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 10/137

11 Final Report Cost Analysis of EntryExit & Registered Traveller Systems 3 METHODOLOGY AND COST ANALYSIS STRUCTURE 3.1 Identifying the Cost Elements For each applicable scenario, cost elements as mentioned in the Terms of Reference [R1] are calculated, based on the expected yearly volumes of thirdcountry national (TCN) travellers. As several commonalities can be found among the various cost scenarios, it is therefore appropriate to introduce wellidentified cost building blocks to be reused in order to rationalise the cost model and reduce inherent complexity. Cost items pertain to the so called Central System (CS) scenario which is to be run by under responsibility of the Management Authority and to Member States distributed systems. For tangible cost elements such as hardware, networking, software and facilities costs have been estimated using a bottomup approach, detailing the actual a BillofMaterials (BOM) of each individual system component. Furthermore, cost values are projected over time up to 2020, so that estimates for 2013, 2015 and 2020 can be extracted as requested by ToR [R1]. Table 2 below provides a complete overview of all cost categories and applicable options. Table 4: Cost Items vs. Solution Scenarios Cost Category Hardware Software Other Capital Expenditure Project Management Quality Assurance Administration Training Central System Distributed System Options Development Operations Development Operations Purchase Maintain Purchase Maintain Deploy Grow Deploy Grow Purchase Maintain Purchase Maintain Develop Grow Develop Grow Deploy Deploy Purchase Deploy Provide Procure Contract Control Plan Deliver Maintain Grow Control Procure Contract Plan Deliver Purchase Deploy Provide Procure Contract Control Plan Deliver Maintain Grow Control Procure Contract Plan Deliver Operating Manage Manage Applicable options are: 1. Architecture a. EE is a selfcontained system, thoroughly independent from SIS/VIS b. EE is interfaced with VIS, leverages BMS features, including database and biometric matcher 2. Retention Time a. 1 year b. 5 years c. 1 year for EE details, 5 years for traveller details 3. RTS Enrolment site Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 11/137

12 Final Report Cost Analysis of EntryExit & Registered Traveller Systems a. Consular post b. At Schengen border control points (BCP) c. Both a) and b) above 4. Border Control mode for RTS users a. Fullyautomated b. Semimanual 5. Housing of EES / RTS a. Colocation with SIS / VIS b. Location independent from SIS / VIS 3.2 Tools Actual costs are calculated by identifying the elementary cost units that are specific or typical of each cost category, such as: Development / Management / Administration o Labour Facilities o Required space o Power o Bandwidth Operations o HW Maintenance o SW Maintenance / Licensing o Labour The Cost Model Microsoft Excel is the tool of choice for elaborating the cost structure that eventually allows calculating solutions cost for the various scenarios. This structure is designed topdown, starting from the ToR [R1] and the supporting documentation. Starting from the business requirements, that quantify system functionality and behaviour, the mostlikely solution architectures have been determined inclusive of technical and software elements based on the findings of [R6] and also taking into account further developments since the publication of that report. The sizing of the system infrastructure is calculated from the expected system load. Sizing in this context comes down to actually determine which of building blocks are required for which scenarios, thus calculating the actual horsepower needed to meet the required performance. Business requirements per se are necessary but not sufficient in order to be able to properly size the solution. In fact, detailed technical assumptions are made to achieve this goal. The starting point is that most costs were as far as possible estimated irrelevant of any particular commercial product. However, infrastructure cost estimates were based on average list prices for popular products, such that cost values are as realistic as possible and drawn from public sources. All relevant assumptions are duly documented in this report, the technical assumptions required for system sizing being implemented as variable parameters in the Excel structure so that they can be changed if and when necessary. Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 12/137

13 Final Report Cost Analysis of EntryExit & Registered Traveller Systems Actual costs are calculated bottomup, aggregating all costs that are captured for each building block. Aggregation to conform to scenarios is then done via the optionbased scenario specifications. Figure 1 shows the spreadsheet workbook structure. EES/RTS Costing Study Final Report Business Requirements (ToR) Feasibility Study Legal Draft etc Costing info Business requirements sizing Scenario parameters Technical Parameters Design assumptions Unisys Team General parameters General Parameters Assumptions Scenario Costs BOM Specification Costs EESRTS Scenario XnC/D EESRTS Sizing EESRTS Parameters Scenario Parameters Building Block info Building Block info Scenario Parameters Building Block info Scenario Parameters Building Block info Scenario Parameters Building Block Building Block Building Block Building Block Pricing details Pricing details Pricing details Pricing details Public Domain Figure 1: Spreadsheet Costing Workbook Structure Function Point Analysis FunctionPoint Analysis (FPA) was used to estimate the effort required to develop the custommade software components. FPA is a wellknown and accepted technique that allows estimating the functional size of the system, describing it as a number of Function Points. In summary, the technique is based on analysing the data that is stored and managed by the system, its interactions with the users and other systems that store external data. The level of complexity of the data to be handled and the required operations on the data represent a reliable measure of the functional size of the system. As system sizing is fully based on system functionality as perceived from the user s perspective, this technique is well suited for this cost analysis as only the functional behaviour of the EES and RTS systems are known at this time. The results from FPA do not represent cost, or project schedule. They are treated as input data into the CostXpert cost analysis tool (see below). For each required scenario, an FPA estimation was performed, which led to a single spreadsheet containing the results and documenting all parameters. Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 13/137

14 Final Report Cost Analysis of EntryExit & Registered Traveller Systems CostXpert 3 CostXpert is a parametric tool capable of estimating development costs and planning of a software development project. The tool relies on industry best practice data that are gathered by researchers in this area. The Cost Xpert Tool Suite represents the latest standard of the Integrated Methodology driven Estimation (IME) and is an intuitive operated standard tool for the realistic estimation of effort, time, resources and cost to complete a project, as well as an estimate of potential risk, defects, and documentation page count for the entire IT application life cycle. Our solution is based on scientifically published methods and models, industry standards and best practice approaches. It is the most comprehensive approach, covering any project situation no matter if it is feasibility phase, development or maintenance. The intelligent consideration of all relevant elements including project types, process models, hard facts, soft facts, quality and risk factors and constraints ensures the accurate estimation. The intuitive workflow and precalibrations of our expert system, as well as a wizard guided assessment enables the effective use of methods even without the necessarily need to become a methodology expert first. 4 CostXpert supports a wide variety of estimation algorithms and methods. One all important input parameter is the actual size of the solution, but the tool also caters for such characteristic elements as the development environment, development methodology and maturity and quality of the development organisation. CostXpert also provides a highlevel project plan, inclusive of a Work Breakdown Structure (WBS), estimating the project s efficiency and throughput time. Based on proper hourly rates, it can thus provide a reliable estimate of development costs. Lastly, it is worth observing that the calculated values include costs associated with the early phase immediately following the system s deployment, as the model also allows estimates of the number and nature of system infancy defects and incidents that need resolution Infrastructure Design and Sizing Designing the system infrastructure is mandatory, as it is needed to estimate infrastructure costs and also to understand the impact in terms of required storage space, network capacity and power. This design was done assuming an Enterprise Data Centre Architecture (EDCA) model, while using Queuing Theory to estimate the physical size of the infrastructure in combination with the expected system loads. Again, a spreadsheet was used to capture all this information Accuracy Given the many assumptions made given the level of uncertainty on the final solution, and the many options proposed the described approach led to estimates that we consider realistic, if not real, as we consider overall accuracy to fall in the surroundings of 20% to 30%. This is well in line with industry s best practices and historical data. In fact, the relevant amount of options, alternative scenarios and undefined constraints make it impossible to provide estimates much closer to the final figures. Therefore, all cost values in the following of this report should be considered a median value, considering circa 25% as confidence range, plus or minus. 3 The Estimation Company. 4 Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 14/137

15 Final Report Cost Analysis of EntryExit & Registered Traveller Systems 4 USE CASES The Use Cases that are described in this section represent the basis for estimating the functional requirements of the solution system(s). These requirements serve then as an input to the FPA phase. These Use Cases are examples of the information that is presented in the Technical Feasibility Study [R6] and in the proposal for the foreseen implementation [R5], though the information from these sources is used to perform the analysis. The described processes are without prejudice to the final technical implementation at central or national level. 4.1 Third Country National Border Crossing Entry 5 CONTEXT BRIEF DESCRIPTION ACTORS STAKEHOLDERS & INTEREST PRECONDITIONS TCN travellers crossing external EU borders to enter the Schengen area This process is triggered when a TCN Traveller wishes to cross the border to enter the EU Schengen area He/she must undergo a border check procedure. Border Officer National Border Check System (NBCS) TCN Traveller The stakeholders are the EES, VIS, SIS, other national systems/databases The interest of these stakeholders is to support the border check procedure and, for EES, to record the entry record of TCN travellers BCP is open and accepting travellers Border Officer is available TCN Traveller presents herself at a border checkbooth 5 Note that this use case does not take into account RTS, which is described in section 4.3. Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 15/137

16 Final Report Cost Analysis of EntryExit & Registered Traveller Systems Figure 2: TCN Border Crossing Systems Map Entry Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 16/137

17 Final Report Cost Analysis of EntryExit & Registered Traveller Systems A Border Officer gathers information from the TCN s travel document and inserts it in the NBCS Source Interface Input Data Process Output Data Interface Storage Hyperlinks Travel Travel MRZ Scan MRZ_Validity_Status_OK Credential Credential Reader MRZ Read Pax_Details Travel_Credential_Details Pax_Details Travel_Credential_Details Write Entry_Data_Record INBCS NBCS B NBCS interrogates various databases (EES, SIS and national databases, possibly in parallel) to confirm document validity validate the travellers identity help assess her entry eligibility Specifically, EES confirms that TCN Traveller has not previously overstayed, returns the allowed number of days for the present stay and sends the result to the NBCS NBCS returns any relevant information found SIS ISIS Entry_Data_Record Check Blacklist SIS_Entry_Status INBCS NBCS EES IEES Entry_Data_Record Check EE History EE_Entry_Status INBCS NBCS Other Syt s IOthers Entry_Data_Record Check Blacklist Other_Sys_Entry_Status INBCS NBCS Other Syt s IOthers Entry_Data_Record Check Other_Sys_Entry_Status INBCS NBCS NBCS *_Entry_Status Assessment & Clearance Entry_Status_OK Display NBCS C Border Officer helps and supervises the traveller while capturing her fingerprints NBCS verifies the quality of the fingerprints and stores them temporarily for later processing Border Officer allows the TCN to enter the Schengen area and inserts his decision in the NBCS Traveller Fingerprint Fingerprints Scan Fingerprint_Image INBCS NBCS scanner Fingerprint_Template NBCS Fingerprint_Image Check Quality Level Fingerprint_Quality_Status NBCS Fingerprint_Template NBCS INBCS Fingerprint_Quality_Status *_Entry_Status Decision on Entry Decision_on_Entry_OK Border Officer Interactive Dialogue Procedural_Q&A Decision on Entry Decision_on_Entry_OK INBCS NBCS Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 17/137

18 Final Report Cost Analysis of EntryExit & Registered Traveller Systems D NBCS creates an EES record, inclusive of biographic and biometric data gathered earlier in the process NBCS purges any temporary data stored Source Interface Input Data Process Output Data Interface Storage Hyperlinks NBCS Pax_Details Write EE_Data_Record IEES EES Fingerprint_Image Fingerprint_Template Decision_on_Entry_OK Date&Time_Stamp BCP NBCS *_Temporary_Data Delete If TCN holds a valid entry visa, the following event applies. E Border Officer additionally gathers information from the visa sticker and inserts it in the NBCS NBCS additionally interrogates VIS to validate the traveller s identity and visa to help assess eligibility to entry Source Interface Input Data Process Output Data Interface Storage Hyperlinks TCN Visa Visa Reader Visa_Data Scan Visa_Data INBCS NBCS VIS IVIS Visa_Data Check Visa Validity Visa_Validity_OK INBCS NBCS In case TCN needs to be redirected to secondline checks, the following event applies. Border Officer cancels the procedure F NBCS purges any unneeded information TCN is directed to secondline checks Source Interface Input Data Process Output Data Interface Storage Hyperlinks NBCS Interactive *_Temporary_Data Delete In the case the TCN is not granted entry to the Schengen zone, the following event applies. Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 18/137

19 Final Report Cost Analysis of EntryExit & Registered Traveller Systems G Border Officer enters recording of refusal of entry in the national system (This point is referred here for completeness, but is out of scope for the current cost study). Source Interface Input Data Process Output Data Interface Storage Hyperlinks Refuse_Entry Write Interactive NBCS Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 19/137

20 Final Report Cost Analysis of EntryExit & Registered Traveller Systems 4.2 Third Country National Border Crossing Exit CONTEXT BRIEF DESCRIPTION ACTORS STAKEHOLDERS & INTEREST PRECONDITIONS TCN travellers crossing external EU borders to exit the Schengen area This process is triggered when a TCN Traveller wishes to cross the border to exit the EU Schengen area He/she must undergo a border check procedure. Border Officer National Border Check System (NBCS) Automated Exit Gate (egate) TCN Traveller The stakeholders are the EES, VIS, SIS, other national systems/databases The interest of these stakeholders is to support the border exit procedure and, for EES, to record the exit record of TCN travellers BCP is open and accepting travellers Border Officer is available, or Automated Gate (egate) is available under Border Officer supervision TCN Traveller presents herself at a border checkbooth Figure 3: TCN Border Crossing Systems Map Exit Quality Assurance, JLSB , CBEso30REP003_1 30_Entry Exit Cost Study_Final Report.doc, p. 20/137

Presentation on the Commission s Technical Study on Smart Borders. LIBE Hearing 23 February 2015

Presentation on the Commission s Technical Study on Smart Borders. LIBE Hearing 23 February 2015 Presentation on the Commission s Technical Study on Smart Borders LIBE Hearing 23 February 2015 Rob Rozenburg Head of Unit - Information Systems for Borders and Security European Commission - DG HOME The

More information

Technical Study on Smart Borders. Final Report

Technical Study on Smart Borders. Final Report Technical Study on Smart Borders Final Report Written by PwC October 2014 EUROPEAN COMMISSION Directorate-General for Home Affairs Directorate C Schengen Unit C.3 Transeuropean Networks for Freedom and

More information

Technical Study on Smart Borders. Final Report

Technical Study on Smart Borders. Final Report Technical Study on Smart Borders Final Report Written by PwC October 2014 EUROPEAN COMMISSION Directorate-General for Home Affairs Directorate C Schengen Unit C.3 Transeuropean Networks for Freedom and

More information

Council of the European Union Brussels, 13 November 2015 (OR. en)

Council of the European Union Brussels, 13 November 2015 (OR. en) Council of the European Union Brussels, 13 November 2015 (OR. en) 12527/1/15 REV 1 LIMITE JAI 701 FRONT 202 COMIX 451 NOTE From: Presidency To: Working Party on Frontiers/Mixed Committee (EU-Iceland/Liechtenstein/Norway/Switzerland)

More information

COMMISSION STAFF WORKING PAPER SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

COMMISSION STAFF WORKING PAPER SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document EUROPEAN COMMISSION Brussels, 28.2.2013 SWD(2013) 51 final COMMISSION STAFF WORKING PAPER SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document PROPOSAL FOR A REGULATION OF THE EUROPEAN PARLIAMENT

More information

Technical Study on Smart Borders Cost Analysis. Final Report

Technical Study on Smart Borders Cost Analysis. Final Report Technical Study on Smart Borders Cost Analysis Final Report Written by PwC October 2014 EUROPEAN COMMISSION Directorate-General for Home Affairs Directorate C Schengen Unit C.3 Transeuropean Networks for

More information

Security Audit VIS Central System. Summary Report

Security Audit VIS Central System. Summary Report Security Audit VIS Central System Summary Report 1 June 2012 1 1. INTRODUCTION 1.1 Visa information system The Visa Information System (VIS) is a system for the exchange of data on short-stay visas among

More information

Conformance test specification for BSI-TR 03121 Biometrics for public sector applications

Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Technical Guideline TR-03122-1 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik

More information

Biometrics for Public Sector Applications

Biometrics for Public Sector Applications Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach

More information

Privacy by Design The case of Automated Border Control. Authors: Pagona Tsormpatzoudi, Diana Dimitrova, Jessica Schroers and Els Kindt

Privacy by Design The case of Automated Border Control. Authors: Pagona Tsormpatzoudi, Diana Dimitrova, Jessica Schroers and Els Kindt Privacy by Design The case of Automated Border Control Authors: Pagona Tsormpatzoudi, Diana Dimitrova, Jessica Schroers and Els Kindt Overview: (Automated) border control; Identity management in (Automated)

More information

Technical Study on Smart Borders Cost Analysis. Final Report

Technical Study on Smart Borders Cost Analysis. Final Report Technical Study on Smart Borders Cost Analysis Final Report Written by PwC October 2014 EUROPEAN COMMISSION Directorate-General for Home Affairs Directorate C Schengen Unit C.3 Transeuropean Networks for

More information

Smart Borders: Comparing the Use of New Technology in Border Controls in the US and the EU

Smart Borders: Comparing the Use of New Technology in Border Controls in the US and the EU Smart Borders: Comparing the Use of New Technology in Border Controls in the US and the EU Maegan Hendow Research Unit Tampa, FL, April 2014 Technology at border control Fingerprint scanners Databases

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

Information about the European Union is available on the Internet. It can be accessed through the Europa server ( www.europa.eu).

Information about the European Union is available on the Internet. It can be accessed through the Europa server ( www.europa.eu). European Agency for the Management of Operational Cooperation at the External Bo of the Member States of the European Union Best Practice Guidelines on the Design, Deployment and Operation of Automated

More information

Modular biometric architecture with secunet biomiddle

Modular biometric architecture with secunet biomiddle Version 2.1 Modular biometric architecture with secunet biomiddle White Paper Version 2.0, 25/03/10 secunet Security Networks AG Copyright 2010 by secunet Security Networks AG This document is for information

More information

COMMISSION STAFF WORKING PAPER IMPACT ASSESSMENT. Accompanying document to the PROPOSAL FOR A REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

COMMISSION STAFF WORKING PAPER IMPACT ASSESSMENT. Accompanying document to the PROPOSAL FOR A REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL EUROPEAN COMMISSION Brussels, 28.2.2013 SWD(2013) 50 final COMMISSION STAFF WORKING PAPER IMPACT ASSESSMENT Accompanying document to the PROPOSAL FOR A REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory

More information

Border control using biometrics in Japan. September 2008 NEC Corporation/Daon

Border control using biometrics in Japan. September 2008 NEC Corporation/Daon Border control using biometrics in Japan September 2008 NEC Corporation/Daon Today s Agenda 1. Project Overview 2. Challenges and Lessons Learned 1. Project Overview Japan Biometrics Identification System

More information

A DIFFERENT KIND OF PROJECT MANAGEMENT: AVOID SURPRISES

A DIFFERENT KIND OF PROJECT MANAGEMENT: AVOID SURPRISES SEER for Software: Cost, Schedule, Risk, Reliability SEER project estimation and management solutions improve success rates on complex software projects. Based on sophisticated modeling technology and

More information

Biometrics for public sector applications

Biometrics for public sector applications Technical Guideline TR-03121-1 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, 53133 Bonn, Germany Email:

More information

BiSPI Conformance Testing

BiSPI Conformance Testing Technical Guideline TR-03122-2 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 2: Software Architecture - BioAPI conformance testing Version 3.0 Bundesamt

More information

Concerning: Norwegian Nurses Organisation s input to the Green Paper on Modernising the Professional Qualifications Directive

Concerning: Norwegian Nurses Organisation s input to the Green Paper on Modernising the Professional Qualifications Directive European Commission Directorate General Internal Market and Services Oslo, August 26th 2011 Concerning: Norwegian Nurses Organisation s input to the Green Paper on Modernising the Professional Qualifications

More information

EU CUSTOMS BUSINESS PROCESS MODELLING POLICY

EU CUSTOMS BUSINESS PROCESS MODELLING POLICY EUROPEAN COMMISSION MASP Revision 2014 v1.1 ANNEX 4 DIRECTORATE-GENERAL TAXATION AND CUSTOMS UNION Customs Policy, Legislation, Tariff Customs Processes and Project Management Brussels, 03.11.2014 TAXUD.a3

More information

A DIFFERENT KIND OF PROJECT MANAGEMENT

A DIFFERENT KIND OF PROJECT MANAGEMENT SEER for Software SEER project estimation and management solutions improve success rates on complex software projects. Based on sophisticated modeling technology and extensive knowledge bases, SEER solutions

More information

PROCESSING & MANAGEMENT OF INBOUND TRANSACTIONAL CONTENT

PROCESSING & MANAGEMENT OF INBOUND TRANSACTIONAL CONTENT PROCESSING & MANAGEMENT OF INBOUND TRANSACTIONAL CONTENT IN THE GLOBAL ENTERPRISE A BancTec White Paper SUMMARY Reducing the cost of processing transactions, while meeting clients expectations, protecting

More information

De-duplication The Complexity in the Unique ID context

De-duplication The Complexity in the Unique ID context De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance

More information

Changes in Schengen visa application process

Changes in Schengen visa application process Changes in Schengen visa application process As part of the worldwide introduction of the Visa Information System (VIS) 1, the Schengen States will launch the VIS in India (and in the neighbouring countries

More information

EBA final draft Regulatory Technical Standards

EBA final draft Regulatory Technical Standards EBA/RTS/2014/11 18 July 2014 EBA final draft Regulatory Technical Standards on the content of recovery plans under Article 5(10) of Directive 2014/59/EU establishing a framework for the recovery and resolution

More information

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.

More information

Develop Project Charter. Develop Project Management Plan

Develop Project Charter. Develop Project Management Plan Develop Charter Develop Charter is the process of developing documentation that formally authorizes a project or a phase. The documentation includes initial requirements that satisfy stakeholder needs

More information

Sofware Requirements Engineeing

Sofware Requirements Engineeing Sofware Requirements Engineeing Three main tasks in RE: 1 Elicit find out what the customers really want. Identify stakeholders, their goals and viewpoints. 2 Document write it down (). Understandable

More information

COMMISSION STAFF WORKING DOCUMENT IMPACT ASSESSMENT. Accompanying the document PROPOSAL FOR A REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

COMMISSION STAFF WORKING DOCUMENT IMPACT ASSESSMENT. Accompanying the document PROPOSAL FOR A REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL EUROPEAN COMMISSION Brussels, 28.2.2013 SWD(2013) 47 final COMMISSION STAFF WORKING DOCUMENT IMPACT ASSESSMENT Accompanying the document PROPOSAL FOR A REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE

More information

Vendor s Guide to the Vendor Deal Portal (VDP)

Vendor s Guide to the Vendor Deal Portal (VDP) Vendor s Guide to the Vendor Deal Portal (VDP) The Toys R Us, Inc On-line Application for Electronic Approval and Management of Credit Allowance Contracts 1 P age TABLE OF CONTENTS 1. ABOUT... 3 2. GETTING

More information

Comments and proposals on the Chapter IV of the General Data Protection Regulation

Comments and proposals on the Chapter IV of the General Data Protection Regulation Comments and proposals on the Chapter IV of the General Data Protection Regulation Ahead of the trialogue negotiations later this month, EDRi, Access, Panoptykon Bits of Freedom, FIPR and Privacy International

More information

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Audio: This overview module contains an introduction, five lessons, and a conclusion. Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules

More information

Department of Homeland Security

Department of Homeland Security Department of Homeland Security Biometrics Overview Neal Latta US-VISIT IDENT Program Manager 1 Importance of Biometric Standards in Post 9/11 Environment Dramatic Increase in Utilization of Biometric

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

The Leading Provider of Identity Solutions and Services in the U.S.

The Leading Provider of Identity Solutions and Services in the U.S. THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that

More information

POSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND

POSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND POSITION PAPER The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND Dear ACI Members and World Business Partners, With the increasing need for secure personal

More information

Best Practice Fingerprint Enrolment Standards European Visa Information System

Best Practice Fingerprint Enrolment Standards European Visa Information System Best Practice Fingerprint Enrolment Standards European Visa Information System Improving performance by improving fingerprint image quality Experiences from pilot project BioDEVII 1 Agenda BioDEVII Phase

More information

Project Execution Guidelines for SESAR 2020 Exploratory Research

Project Execution Guidelines for SESAR 2020 Exploratory Research Project Execution Guidelines for SESAR 2020 Exploratory Research 04 June 2015 Edition 01.01.00 This document aims at providing guidance to consortia members on the way they are expected to fulfil the project

More information

Gateway review guidebook. for project owners and review teams

Gateway review guidebook. for project owners and review teams Gateway review guidebook for project owners and review teams The State of Queensland (Queensland Treasury and Trade) 2013. First published by the Queensland Government, Department of Infrastructure and

More information

Invitation to tender Outsourcing of tasks related to receipt of Schengen visa applications in Egypt

Invitation to tender Outsourcing of tasks related to receipt of Schengen visa applications in Egypt Invitation to tender Outsourcing of tasks related to receipt of Schengen visa applications in Egypt General Information The Ministry of Foreign Affairs and Trade of Hungary aims to continuously improve

More information

From Chaos to Clarity: Embedding Security into the SDLC

From Chaos to Clarity: Embedding Security into the SDLC From Chaos to Clarity: Embedding Security into the SDLC Felicia Nicastro Security Testing Services Practice SQS USA Session Description This session will focus on the security testing requirements which

More information

ANNEX. to the COMMISSION IMPLEMENTING DECISION

ANNEX. to the COMMISSION IMPLEMENTING DECISION EUROPEAN COMMISSION Brussels, 8.8.2014 C(2014) 5650 final ANNEX 1 ANNEX to the COMMISSION IMPLEMENTING DECISION concerning the adoption of the work programme for 2014 and the financing for Union actions

More information

Project Time Management

Project Time Management Project Time Management Plan Schedule Management is the process of establishing the policies, procedures, and documentation for planning, developing, managing, executing, and controlling the project schedule.

More information

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Wikipedia defines cloud computing as Internet-based computing, whereby shared

More information

Application Test Management and Quality Assurance

Application Test Management and Quality Assurance SAP Brief Extensions SAP Quality Center by HP Objectives Application Test Management and Quality Assurance Deliver new software with confidence Deliver new software with confidence Testing is critical

More information

Software Requirements. Specification. Day Health Manager. for. Version 1.1. Prepared by 4yourhealth 2/10/2015

Software Requirements. Specification. Day Health Manager. for. Version 1.1. Prepared by 4yourhealth 2/10/2015 Software Requirements Specification. for Day Health Manager Version 1.1 Prepared by 4yourhealth Senior Project 2015 2/10/2015 Table of Contents Table of Contents Revision History Introduction Purpose Document

More information

Council of the European Union Brussels, 24 November 2014 (OR. en)

Council of the European Union Brussels, 24 November 2014 (OR. en) Council of the European Union Brussels, 24 November 2014 (OR. en) 15701/1/14 REV 1 "I/A" ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11153/2/14 REV 2 Subject: JAI 897 DAPIX 175

More information

INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING

INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING A report submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Computer Science (Computer Systems & Networking)

More information

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric

More information

Capacity Plan. Template. Version X.x October 11, 2012

Capacity Plan. Template. Version X.x October 11, 2012 Template Version X.x October 11, 2012 This is an integral part of infrastructure and deployment planning. It supports the goal of optimum provisioning of resources and services by aligning them to business

More information

Introduction and Background

Introduction and Background Eurodac Supervision Coordination Group REPORT ON THE COORDINATED INSPECTION ON UNREADABLE FINGERPRINTS May 2013 Introduction and Background The collection and further processing of fingerprints occupy

More information

Test Data Management Concepts

Test Data Management Concepts Test Data Management Concepts BIZDATAX IS AN EKOBIT BRAND Executive Summary Test Data Management (TDM), as a part of the quality assurance (QA) process is more than ever in the focus among IT organizations

More information

Introduction to the ITS Project Management Methodology

Introduction to the ITS Project Management Methodology Introduction to the ITS Project Management Methodology In September 1999 the Joint Legislative Committee on Performance Evaluation and Expenditure Review (PEER) produced a report entitled Major Computer

More information

05-12-2011 Framework Contract no: DI/06691-00 Authors: P. Wauters, K. Declercq, S. van der Peijl, P. Davies

05-12-2011 Framework Contract no: DI/06691-00 Authors: P. Wauters, K. Declercq, S. van der Peijl, P. Davies Ref. Ares(2011)1311113 Ares(2012)149022-09/02/2012 06/12/2011 Study on cloud and service oriented architectures for e- government Final report summary 05-12-2011 Framework Contract no: DI/06691-00 Authors:

More information

COMMISSION OF THE EUROPEAN COMMUNITIES

COMMISSION OF THE EUROPEAN COMMUNITIES EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 28.11.2008 COM(2008) 798 final COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE

More information

Five Commandments for Successful COTS Package Testing

Five Commandments for Successful COTS Package Testing View point Five Commandments for Successful COTS Package Abstract Ineffective COTS implementation will cost you Adopting commercial off-the-shelf (COTS) products or packages like ERP, CRM, and HR management

More information

Consultation Paper. Draft Regulatory Technical Standards on the content of resolution plans and the assessment of resolvability EBA/CP/2014/16

Consultation Paper. Draft Regulatory Technical Standards on the content of resolution plans and the assessment of resolvability EBA/CP/2014/16 EBA/CP/2014/16 9 July 2014 Consultation Paper Draft Regulatory Technical Standards on the content of resolution plans and the assessment of resolvability Contents 1. Responding to this Consultation 3 2.

More information

Public Consultation on the Smart Borders Package

Public Consultation on the Smart Borders Package Case Id: 20158ac7-eafa-4dda-a61e-cbbd373c5d88 Date: 01/10/2015 09:37:11 Public Consultation on the Smart Borders Package Fields marked with are mandatory. Questions to all contributors You are responding

More information

Smart Borders and Law Enforcement Access: Legitimacy, Effectiveness, and Proportionality

Smart Borders and Law Enforcement Access: Legitimacy, Effectiveness, and Proportionality Interparliamentary committee meeting European Parliament National Parliaments Smart Borders Package: European Challenges, National Experiences, the way ahead 23-24 February 2015 Smart Borders and Law Enforcement

More information

THE THEME AREA. This situation entails:

THE THEME AREA. This situation entails: IDENTITY AND ACCESS MANAGEMENT: DEFINING A PROCEDURE AND ORGANIZATION MODEL WHICH, SUPPORTED BY THE INFRASTRUCTURE, IS ABLE TO CREATE, MANAGE AND USE DIGITAL IDENTITIES ACCORDING TO BUSINESS POLICIES AND

More information

Big Picture of Big Data Software Engineering With example research challenges

Big Picture of Big Data Software Engineering With example research challenges Big Picture of Big Data Software Engineering With example research challenges Nazim H. Madhavji, UWO, Canada Andriy Miranskyy, Ryerson U., Canada Kostas Kontogiannis, NTUA, Greece madhavji@gmail.com avm@ryerson.ca

More information

Why Plan B DR? Benefits of Plan B Disaster Recovery Service:

Why Plan B DR? Benefits of Plan B Disaster Recovery Service: Benefits of Plan B Disaster Recovery Service: Very Fast Recovery your critical systems back in around 30 minutes. Very simple to set-up it only takes about 20 minutes to install the Plan B DR appliance

More information

CASE STUDY 3 Canada Border Services Agency (CBSA) Aéroport de Montréal Vancouver International Airport

CASE STUDY 3 Canada Border Services Agency (CBSA) Aéroport de Montréal Vancouver International Airport CASE STUDY 3 Canada Border Services Agency (CBSA) Aéroport de Montréal Vancouver International Airport Page 1 Table of Contents EXECUTIVE SUMMARY... 3 1 CUSTOMER NAME... 4 2 BUSINESS CASE BUSINESS DRIVERS...

More information

Service Desk/Helpdesk Metrics and Reporting : Getting Started. Author : George Ritchie, Serio Ltd email: george dot- ritchie at- seriosoft.

Service Desk/Helpdesk Metrics and Reporting : Getting Started. Author : George Ritchie, Serio Ltd email: george dot- ritchie at- seriosoft. Service Desk/Helpdesk Metrics and Reporting : Getting Started Author : George Ritchie, Serio Ltd email: george dot- ritchie at- seriosoft.com Page 1 Copyright, trademarks and disclaimers Serio Limited

More information

ICT Project Management

ICT Project Management THE UNITED REPUBLIC OF TANZANIA PRESIDENT S OFFICE PUBLIC SERVICE MANAGEMENT ICT Project Management A Step-by-step Guidebook for Managing ICT Projects and Risks Version 1.0 Date Release 04 Jan 2010 Contact

More information

CS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed.

CS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed. CS 389 Software Engineering Lecture 2 Chapter 2 Software Processes Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed. Topics covered Software process models Process activities Coping

More information

General Comments and Replies to Questions

General Comments and Replies to Questions DRAFT BSG RESPONSE TO EBA/DP/2015/03 ON FUTURE DRAFT REGULATORY TECHNICAL STANDARDS ON STRONG CUSTOMER AUTHENTICATION AND SECURE COMMUNICATION UNDER THE REVISED PAYMENT SERVICES DIRECTIVE (PSD2) General

More information

Actionable information for security incident response

Actionable information for security incident response Actionable information for security incident response Cosmin Ciobanu 2015 European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information

More information

15.3.3 OOA of Railway Ticket Reservation System

15.3.3 OOA of Railway Ticket Reservation System 448 15.3.3 OOA of Railway Ticket System Assume that domain analysis is complete and DAD is ready for reference. The analyst also has a fair knowledge of the system and the system environment. For the sake

More information

Software Systems Consultants Inc. IT Solutions & Staffing Services

Software Systems Consultants Inc. IT Solutions & Staffing Services Software Systems Consultants Inc. IT Solutions & Staffing Services 137 Carter Court SW Suite 107 Vienna VA, 22180 703.597.4847 Fax 1.877.256.9979 WWW.SSCI-IT.COM wsyriani@ssci-it.com Since it s inception,

More information

Part B1: Business case developing the business case

Part B1: Business case developing the business case Overview Part A: Strategic assessment Part B1: Business case developing the business case Part B2: Business case procurement options Part B3: Business case funding and financing options Part C: Project

More information

Questions & Answers. on e-cohesion Policy in European Territorial Cooperation Programmes. (Updated version, May 2013)

Questions & Answers. on e-cohesion Policy in European Territorial Cooperation Programmes. (Updated version, May 2013) Questions & Answers on e-cohesion Policy in European Territorial Cooperation Programmes (Updated version, May 2013) This fact sheet was drafted jointly by INTERACT and European Commission (DG Regional

More information

Measurement Information Model

Measurement Information Model mcgarry02.qxd 9/7/01 1:27 PM Page 13 2 Information Model This chapter describes one of the fundamental measurement concepts of Practical Software, the Information Model. The Information Model provides

More information

Establishing and Managing the Schengen Masterlist of CSCAs

Establishing and Managing the Schengen Masterlist of CSCAs Establishing and Managing the Schengen Masterlist of CSCAs Big City 21/04/2015 European Commission Directorate-General HOME Unit B3 Information Systems for Borders and Security Richard.Rinkens@ec.europa.eu

More information

Coesys Border Management

Coesys Border Management Coesys Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime,

More information

Machine-readable identity documents with biometric data in the EU

Machine-readable identity documents with biometric data in the EU Machine-readable identity documents with biometric data in the EU Overview of the legal framework 3 by Paul De Hert, Wim Schreurs & Evelien Brouwer The ability of computers to recognise faces, fingerprints,

More information

Extending CMMI Level 4/5 Organizational Metrics Beyond Software Development

Extending CMMI Level 4/5 Organizational Metrics Beyond Software Development Extending CMMI Level 4/5 Organizational Metrics Beyond Software Development CMMI Technology Conference and User Group Denver, Colorado 14-17 November 2005 Linda Brooks Northrop Grumman Corporation Topics

More information

DATRET/EXPGRP (2009) 6 FINAL 11 10 2010. Document 6

DATRET/EXPGRP (2009) 6 FINAL 11 10 2010. Document 6 DATRET/EXPGRP (2009) 6 FINAL 11 10 2010 EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC

More information

Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program

Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program for the Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program DHS/ICE/PIA-015(h) January 15, 2016 Contact Point Peter Edge Executive Associate Director, Homeland Security

More information

Final Draft Guidelines

Final Draft Guidelines EBA/GL/2015/04 20 May 2015 Final Draft Guidelines on factual circumstances amounting to a material threat to financial stability and on the elements related to the effectiveness of the sale of business

More information

IT Financial Management and Cost Recovery

IT Financial Management and Cost Recovery WHITE PAPER November 2010 IT Financial Management and Cost Recovery Patricia Genetin Sr. Principal Consultant/CA Technical Sales David Messineo Sr. Services Architect/CA Services Table of Contents Executive

More information

10128/16 LB/dk 1 DGD 1C

10128/16 LB/dk 1 DGD 1C Council of the European Union Brussels, 13 June 2016 (OR. en) 10128/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 8770/16, 8819/16 Subject:

More information

Tallinn, Estonia. Regulation (EU) No 1077/2011 of the European Parliament and of the Council of 25 October 2011, OJ L 286, 01.11.2011.

Tallinn, Estonia. Regulation (EU) No 1077/2011 of the European Parliament and of the Council of 25 October 2011, OJ L 286, 01.11.2011. OPEN CALL AGENCY S INTERNSHIP Internship No: eu-lisa/14/int/hr/5.1 Unit/Department: Location: Human Resources and Training Unit Tallinn, Estonia Starting date: 16 September 2014 Level of Security Clearance:

More information

Implementation of biometrics, issues to be solved

Implementation of biometrics, issues to be solved ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents

More information

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population. 1. What is the current status of the project? INDECT started the 3rd year of work. Almost 3 years are ahead of the project. All project tasks are realized according to the schedule. Current status of the

More information

Enterprise Content Management (ECM)

Enterprise Content Management (ECM) Business Assessment: A Quick-Reference Summary Intro to MIKE2 methodology and phase 1 The methodology that will be used throughout the specialist track is based on the MIKE2 methodology. MIKE stands for

More information

HUMAN RESOURCES SOFTWARE FOR THE EVOLVING BUSINESS

HUMAN RESOURCES SOFTWARE FOR THE EVOLVING BUSINESS HUMAN RESOURCES SOFTWARE FOR THE EVOLVING BUSINESS Overview HR.net Express has been designed for small to medium sized enterprises that want to manage their employee information more effectively. The software

More information

Tangible and Rapid Adoption of Cloud Technologies

Tangible and Rapid Adoption of Cloud Technologies Die Cast Framework for your Cloud Adoption Tangible and Rapid Adoption of Cloud Technologies 1 Theme: Technologies for redefining India 2 Keywords: Cloud Adoption, SaaS, Rapid Adoption 3 Abstract Enterprise

More information

EENA Operations Document. Contingency Plans. Status of the document: Draft For comments Approved. EENA Operations Document Contingency Plans

EENA Operations Document. Contingency Plans. Status of the document: Draft For comments Approved. EENA Operations Document Contingency Plans EENA Operations Document Contingency Plans Title: Contingency Plans Version: 1.0 Code: 3.2.2 Contingency Plans Revision Date: 02-12-2013 Status of the document: Draft For comments Approved 1 Contributors

More information

Bottom-up sales forecasting for Pre-revenue Start-ups

Bottom-up sales forecasting for Pre-revenue Start-ups Sales & Revenue Forecasting Series Bottom-up sales forecasting for Pre-revenue Start-ups MaRS Discovery District, May 2011 See Terms and Conditions MaRS 2 Introduction What to expect This workbook guide

More information

Coesys Border Management

Coesys Border Management Coesys Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime,

More information

MANAGING THE SYSTEMS DEVELOPMENT LIFE CYCLE

MANAGING THE SYSTEMS DEVELOPMENT LIFE CYCLE CHAPTER MANAGING THE SYSTEMS DEVELOPMENT LIFE CYCLE The development of a new information system is a complicated effort. But it must be done. Manual systems are eventually automated and old systems become

More information

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION A RECENT SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PARED WITH THE FACT THAT

More information

User Authentication Guidance for IT Systems

User Authentication Guidance for IT Systems Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance

More information

Biometric Enterprise Architecture

Biometric Enterprise Architecture Prepared by: Team Biometric Enterprise Architecture (Team BM-EA) In partial fulfillment Of Requirements for SYS/OR 798 Fall 2009 Date: Revision History Date Purpose Revision Level Responsible Person October

More information