January SEARCH Membership Meeting

Size: px
Start display at page:

Download "January 2013. SEARCH Membership Meeting"

Transcription

1 January 2013 SEARCH Membership Meeting

2 Best Practices = Survival Skills: Figure out what CJIS is doing and copy it.ansi NIST ITL 2011, EBTS 10.0 If you are confused, call Charlie Schaeffer (FDLE) and Mike Lesko (Texas DPS) Can you get where you want to go with your legacy vendor? The participants who start the project aren t necessarily the ones who complete the project preserve the record! Make effective use of outsourcing for project Mgt and Technical Specs Don t Pave COWPATHS! 2

3 Perfect is the Enemy of Done! Insisting on perfection often results in no improvement at all Voltaire? 3

4 4

5 Feature Present 2012 Capability Projected 2020 Capability Daily Ten print Submissions 7,000 11,000 Daily Latent Submissions 500 3,000 Ten print Database Size 7,000,000 26,000,000 Multi Event Database-Up to 4 1 st QTR Exists Events 2014 Palm Database Size 500,000 4,750,000 WIN Connected Ten print 29,000,000 40,000,000 Database Size 5

6 WIN will have a Disaster Recovery Capability DR System is being built in Rancho Cordova, CA System will be deployed to NEC Irving Texas 6

7 WIN Stature within the CJIS Community: WIN is a Private Entity providing services to criminal justice agencies for the Administration of Criminal Justice: Subject to 28 CFR as a private entity. Like Nlets Maintains CJIS Security Addendums with WIN Members Maintains CJIS Security Addendum with NEC Maintains WIN Security Policy which adopts CJIS Security Policy WIN has an assigned ORI 7

8 WIN Business Model: (c)(3) Non Profit formed in 1989 (Nevada Corp) 2. Governed by a Board of Directors from the 9 Member States 3. WIN-Operations Group ID Bureau Managers 4. WIN Staff in Sacramento manage the day to day business 5. WIN Provides an AFIS Service Bureau utilized by 8 Western State Repositories. 6. WIN Provides a Proprietary (Non-NIST) search network to the California DOJ, California Locals and Las Vegas Metro. 7. WIN is programmed to submit and receive NIST Ten Print and Latent INBOUND OUTBOUND Searches. 8

9 WIN Management Model: Minimize Staff Optimize Outsourcing of Required Services WIN recently completed a High Profile Bid NEC continues as ABIS service provider WIN Contracts with Nlets for Network Management WIN Contracts with AWARE for EBTS related Support WIN Contracts with a CPA for Accounting Services 9

10 WIN Management Model (Contd): WIN Presently has 3 Staff: Ken Bischoff CEO Dusty Clark Training and QA Manager Gary Goad Member Services Manager Contract with Technical and other Expertise as required: HAI IAFIS, NGI, RCMP, IRAQ Acquisitions MTG Management Consultants Planning, Procurement Downey Brand Legal Support 10

11 How WIN Got Started: Leadership from Western Members of the Former NCIC APB Leadership from Western States Information Network (RISS) Resolution from the Western Legislative Conference Resolution from the Conference of Western Attorneys General Legal Assistance from State Attorneys Procurement Assistance from State Entities RFP/Specifications Assistance from California DOJ 11 Volunteerism from the original state members

12 WIN Governing Documents: Articles of Incorporation Corporation Bylaws User Agreements Central Site Member Interface State Member Local Reciprocal Search Agreement Service Provider Contracts 12

13 WIN System Documentation Electronic Biometric Transmission Specification NIST Device Configuration Guide 13 Technical System Specifications System Design Interface NIST Submission, NGI, CCH Continuity of Operations Plan Training Plan, User Guides In Plant Security Plan Implementation Statement of Work Operational Statement of Work

14 Current Activities: 1.Support legacy platform 14 2.Build and Deploy New Platform: Adopt new NGI Functionality Migrate to multi-event, Fusion Matching Deploy Disaster Recovery Site Work with membership to participate in Factory, Site and User acceptance. Update EBTS to comport with updated environment. Upgrade Network, CJIS WAN Backup, Disaster Recovery/Failover Links

15 Nlets Support Role: 1.Network Management 2.Device acquisition configuration 3.CJIS Security Compliance 4.Network Documentation 5.Member Troubleshooting Support 15

16 AWARE Support Role: On call EBTS technical support Maintain WIN EBTS Verification Software Maintain WIN EBTS Reference Guides Capable of providing State Specific Support Local EBTS field requirements High volume integrated Scanners Local Workflow Management (BIOsp) 16

17 17

18 What were we thinking? A decade prior to IAFIS, No National Standards No Interfaces Submission, CCH, IAFIS, 9.6 Baud Implement Nations first Multi-State AFIS System Search CalDOJ, California Locals, Washington, Alaska. WIN Bid for initial system, NEC Awarded Bid. 18

19 What are we thinking? WIN continues to be relevant. Perhaps even more so today: INTEROPERABILITY - See National Academy of Sciences (NAS) and Latent Print Interoperability reports: Strengthening Forensic Science in the United States: A Path Forward, Latent Print Interoperability: State and Local Perspectives by NOBLIS WIN s Next Generation ABIS adopts the new latent extended feature set interoperability standard. 19

20 State Repositories Have Common Needs that can Be leveraged: FBI Next Generation Identification Criminal History Interface Civil and Criminal event capture Mobile ID Security CJIS Security Compliance Support for in state local agencies Support for State Criminal Justice System 20

21 National Standards apply that can be leveraged: All states must comply with NIST/EBTS to submit to NGI. We are already using a shared standard. All States use FBI EBTS Transactions. Record Types are the same. WIN provides a standards based NIST Submission Interface WIN Provides a Standards based CCH Interface WIN Provides a Standards based NGI Interface WIN Provides flexibility within these interfaces 8 states are successfully using these same standards and interfaces Build Once..Deploy Many 21

22 Future Growth: WIN TEXAS DPS Interface WIN Architecture Can accommodate new members Concept of Scope 22

23 Questions? 23

Best Practice Procedures for The Exchange of Latent Identification Services

Best Practice Procedures for The Exchange of Latent Identification Services Best Practice Procedures for The Exchange of Latent Identification Services The Texas Experience Mike Lesko Texas DPS Addressing the Needs of the Texas Latent User Latent exchange must: Be Inexpensive

More information

Classification: CJIS Program Manager (UCR/Auditing) Title Code: V00681 Pay Range: 34

Classification: CJIS Program Manager (UCR/Auditing) Title Code: V00681 Pay Range: 34 Pay Range: 34 POSITION SUMMARY: This is advanced professional, technical, and consultative work that involves developing, organizing, implementing, and directing all activities associated with a specific

More information

System availability will be limited during this initiative. Accordingly, the CJIS Division will provide advanced notice of sporadic system

System availability will be limited during this initiative. Accordingly, the CJIS Division will provide advanced notice of sporadic system }-I '. MEMORANDUM OF UNDERSTANDING. BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND THE STATE OF HAWAII DEPARTMENT OF THE ATTORNEY GENERAL FOR THE INTERSTATE PHOTO SYSTEM FACIAL RECOGNITION PILOT GENERAL

More information

Extended Feature Set Profile Specification

Extended Feature Set Profile Specification NIST Special Publication 1134 Extended Feature Set Profile Specification Will Chapman Austin Hicklin George Kiebuzinski Peter Komarinski John MayerSplain Melissa Taylor Rachel Wallner http://dx.doi.org/10.6028/nist.sp.1134

More information

PRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS

PRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS PRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS Identification technology has progressed from just being fingerprint matching

More information

CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION

CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION 1. Purpose: CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION The intent of this agreement and the policies and procedures herein is to facilitate compliance in Colorado with

More information

Alan Ferretti CJIS Information Security Officer

Alan Ferretti CJIS Information Security Officer Alan Ferretti CJIS Information Security Officer AGENDA What is CJIS? What is the APB? What is new in the latest version of the CJIS Security Policy? Advanced Authentication change Mobile policy for Tablets

More information

South Carolina Law Enforcement Division Criminal Justice Information System (CJIS)

South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) USER AGREEMENT AND SYSTEM RESPONSIBILITIES Introduction The South Carolina Criminal Justice Information and Communications

More information

Department of Veterans Affairs VHA DIRECTIVE 2011-005 Veterans Health Administration Washington, DC 20420 February 8, 2011

Department of Veterans Affairs VHA DIRECTIVE 2011-005 Veterans Health Administration Washington, DC 20420 February 8, 2011 Department of Veterans Affairs VHA DIRECTIVE 2011-005 Veterans Health Administration Washington, DC 20420 RADIOLOGY PICTURE ARCHIVING AND COMMUNICATION SYSTEMS (PACS) 1. PURPOSE: This Veterans Health Administration

More information

Arkansas. California. Connecticut. Delaware

Arkansas. California. Connecticut. Delaware Arkansas California Yes, This would include Youth Organizations and Human Resource Agencies pursuant to California Penal code Section 11105.3 Yes Connecticut Delaware Yes, but no one is doing is yet. need

More information

Rapid DNA Analysis in the Police Booking Suite: FBI Initiative for Reference Sample Point-of-Collection Analysis

Rapid DNA Analysis in the Police Booking Suite: FBI Initiative for Reference Sample Point-of-Collection Analysis Rapid DNA Analysis in the Police Booking Suite: FBI Initiative for Reference Sample Point-of-Collection Analysis 13 th European Forensic DNA Working Group Meeting Krakow, Poland May 10, 2012 Clark Jaw

More information

Mission Statement. Provide comprehensive vendor and project management solutions tailored specifically to our clients needs.

Mission Statement. Provide comprehensive vendor and project management solutions tailored specifically to our clients needs. Mission Statement Provide comprehensive vendor and project management solutions tailored specifically to our clients needs. Company History 1997 Founded Icon Information Consultants, LP Market Focus: Contingent

More information

Western Service Center

Western Service Center Western Service Center Ken W. Canziani, IAAI-CFI Special Investigator Sacramento/Bay Area California Reno/Sparks, Nevada 916-922-0240 kcanziani@uis-usa.com EDUCATION: Sacramento State University Sacramento,

More information

CJIS Information Technology Security Audit (ITSA) 2015 Program Update

CJIS Information Technology Security Audit (ITSA) 2015 Program Update CJIS Information Technology Security Audit (ITSA) 2015 Program Update Greg Verharst CJIS Information Security Officer Greg.Verharst@state.or.us (503) 934-2335 The 4 W s of CJIS Audits Who receives Information

More information

YEAR TWO. Total Credits 3 Total Credits 6 Total Credits 3 Total Credits 6 Total Credits 6

YEAR TWO. Total Credits 3 Total Credits 6 Total Credits 3 Total Credits 6 Total Credits 6 FALL 1 START (Online) WINTER 1 (FIRST 8 WEEKS) WINTER 2 (SECOND 8 WEEKS) PUB 5409 3 PUB 5419 3 PUB 5429 3 PUB 5439 3 PUB 5459 3 CJI 0510 3 CJI 0520 3 PUB 5469 3 Total Credits 3 Total Credits 6 Total Credits

More information

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. Alan Ferretti CJIS Information Security Officer Texas Department of Public Safety CJIS Security Policy version 5.2: On 8/9/2013

More information

Introduction DEFINITIONS

Introduction DEFINITIONS Pennsylvania Commission on Crime and Delinquency Guidelines and Technology Standards for the Collection and Transmission of Booking Center Captured Offenders' Identification Information Table of Contents

More information

Moving Service Management to SaaS Key Challenges and How Nimsoft Service Desk Helps Address Them

Moving Service Management to SaaS Key Challenges and How Nimsoft Service Desk Helps Address Them Moving Service Management to SaaS Key Challenges and How Nimsoft Service Desk Helps Address Them Table of Contents Executive Summary... 3 Introduction: Opportunities of SaaS... 3 Introducing Nimsoft Service

More information

MORPHO CRIMINAL JUSTICE SUITE

MORPHO CRIMINAL JUSTICE SUITE MORPHO CRIMINAL JUSTICE SUITE FULL RANGE OF PRODUCTS DEDICATED TO CRIMINAL JUSTICE MISSIONS 2 1 3 Morpho provides law enforcement with a wide range of products to support criminal investigation, background

More information

1 WHAT IS IPSFRP? 2 WHO CAN USE IPSFRP? 3 HOW DO I USE IPSFRP?

1 WHAT IS IPSFRP? 2 WHO CAN USE IPSFRP? 3 HOW DO I USE IPSFRP? i I, I 1 WHAT IS IPSFRP? The Interstate Photo System Facial Recognition Pilot (IPSFRP) accepts Facial Recognition Search (FRS) requests and returns a s~ore-ranked list of candidates in the Search Results

More information

CJIS Division Update

CJIS Division Update CJIS Division Update Oregon State Police Criminal Justice Information Services Division Kendele Miyasaki, Training Coordinator Russ Hoskins, Training Specialist CJIS/LEDS Contact Information Criminal Justice

More information

Technical Assistance Guide No. 05-13 PDMP Data Management Solutions

Technical Assistance Guide No. 05-13 PDMP Data Management Solutions Technical Assistance Guide No. 05-13 PDMP Data Management Solutions April 25, 2013 Introduction During this time of a slow and struggling economy, public agencies are asked to do more with less. As state

More information

Submitted to: Service Definition Document for Database Management for IT Infrastructure Management

Submitted to: Service Definition Document for Database Management for IT Infrastructure Management Submitted to: Service Definition Document for Database Management for IT Infrastructure Management Table of Contents 1 Service Description... 3 2 Support Process and Methodology... 10 3 Standard Questionnaire...

More information

Adapting BJS s web-based recidivism analysis tool for state-level queries

Adapting BJS s web-based recidivism analysis tool for state-level queries For Internal Use Only Adapting BJS s web-based recidivism analysis tool for state-level queries Matt Durose Statistician Bureau of Justice Statistics National Corrections Reporting Program Data Providers

More information

Overview of Current Criminal Justice Information Systems

Overview of Current Criminal Justice Information Systems Overview of Current Criminal Justice Information Systems by James X. Dempsey Center for Democracy & Technology www.cdt.org Criminal justice information systems can be divided roughly into two categories:

More information

Criminal Justice Information Services (CJIS) Security Policy

Criminal Justice Information Services (CJIS) Security Policy U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.4 Prepared by: CJIS Information

More information

Criminal Justice Information Services (CJIS) Security Policy

Criminal Justice Information Services (CJIS) Security Policy U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.0 Prepared by: CJIS Information

More information

Hosting JDE EnterpriseOne in the Cloud Hear how one company went to the cloud

Hosting JDE EnterpriseOne in the Cloud Hear how one company went to the cloud Hosting JDE EnterpriseOne in the Cloud Hear how one company went to the cloud October 2015 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T Agenda Organizational

More information

Security in Fax: Minimizing Breaches and Compliance Risks

Security in Fax: Minimizing Breaches and Compliance Risks Security in Fax: Minimizing Breaches and Compliance Risks Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information

More information

REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES

REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES CITY OF RICHLAND HILLS, TEXAS REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by the City of Richland Hills for Information Technology Support Services. Interested

More information

SIP-ing? Pipeline Articles www.contactcenterpipeline.com

SIP-ing? Pipeline Articles www.contactcenterpipeline.com tech line / jul 2013 Time to Start SIP-ing? Can a SIP-based solution add value for your contact center? A look at the key opportunities and considerations. By Ken Barton, and Matt Morey, Strategic Contact

More information

Identity Management: Going Beyond Biometrics! Presented by: JOSEPH J. ATICK, Ph.D. PRESIDENT AND CEO

Identity Management: Going Beyond Biometrics! Presented by: JOSEPH J. ATICK, Ph.D. PRESIDENT AND CEO Identity Management: Going Beyond Biometrics! Presented by: JOSEPH J. ATICK, Ph.D. PRESIDENT AND CEO Agenda I. Identity Management vs. Biometrics II. Identity Frameworks III. Program/System Integration

More information

FUNCTIONAL AREA 12. Network Administration (NET)

FUNCTIONAL AREA 12. Network Administration (NET) FUNCTIONAL AREA 12 Network Administration (NET) Incumbents in this functional area address interoperability issues related to hardware, software, and connectivity of communications such as cable, fiber

More information

ACQUISITION OF COMPUTER HARDWARE, SOFTWARE AND SERVICES

ACQUISITION OF COMPUTER HARDWARE, SOFTWARE AND SERVICES Metro Met..po'"'" T""'porta"O" Autho." One Gateway Plaza Los Angeles, CA 90012-2952 213. 922. 2000 - metro. net FINANCE & BUDGET COMMITTEE AUGUST 19, 2004 SUBJECT: ACTION: ACQUISITION OF COMPUTER HARDWARE,

More information

The Dos and Don'ts of Choosing a Telephone System Upgrade: Including the DMS Options

The Dos and Don'ts of Choosing a Telephone System Upgrade: Including the DMS Options The Dos and Don'ts of Choosing a Telephone System Upgrade: Including the DMS Options With Phillip Sherman, President of Telecom Advisors Group, Inc. Moderated by Mike Bowers, Executive Editor of DealersEdge

More information

Next Generation Identification Program (NGI) Rap Back Service

Next Generation Identification Program (NGI) Rap Back Service U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Next Generation Identification Program (NGI) Rap Back Service Criminal Justice Policy and Implementation

More information

Criminal Justice Information Services (CJIS) Security Policy

Criminal Justice Information Services (CJIS) Security Policy U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.5 06/01/2016 Prepared by:

More information

Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008

Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008 Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008 TABLE OF CONTENTS SB9 OVERVIEW... 3 DEFINITIONS... 4 THE FINGERPRINTING PROCESS:... 6 SUMMARY OF REQUIREMENTS FROM THE BILL...

More information

Advanced IT Pro Course for Office SharePoint Server 2007 and SharePoint Services 3.0

Advanced IT Pro Course for Office SharePoint Server 2007 and SharePoint Services 3.0 Advanced IT Pro Course for Office SharePoint Server 2007 and SharePoint Services 3.0 50047: Advanced IT Pro Course for Microsoft Office SharePoint Server 2007 and Windows SharePoint Services 3.0 (5 Days)

More information

Request of Expressions of Interest For Information Technology Consulting Firm

Request of Expressions of Interest For Information Technology Consulting Firm Election Commission Secretariat Preparation of Electoral Roll with Photographs and Facilitating the Issuance of National Identity Card Project Islamic Foundation Building Agargaon, Dhaka. No. PERP&FINIDC/Ops/040/480

More information

South Carolina Law Enforcement Division Criminal Justice Information System (CJIS)

South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) USER AGREEMENT AND SYSTEM RESPONSIBILITIES Introduction The South Carolina Criminal Justice Infonnation and Communications

More information

Texas State Library and Archives Commission. Information Technology Detail. August 26, 2010

Texas State Library and Archives Commission. Information Technology Detail. August 26, 2010 Texas State Library and Archives Commission Information Technology Detail 82 th Regular Session, Agency Submission, Version 1 August 26, 2010 PAGE: 1 of 6 5005 ACQUISITN INFO RES TECH 4 Computer Resources/Network

More information

Department-wide Systems and Capital Investment Program

Department-wide Systems and Capital Investment Program Department-wide Systems and Capital Investment Program Mission Statement The Department-wide Systems and Capital Investments Program (DSCIP) is authorized to be used by or on behalf of the Treasury Department

More information

Vendor Questions and Responses

Vendor Questions and Responses Vendor Questions and Responses 1. What server are you planning to use for this environment? IBM, Microsoft, Linux/Unix The RFP requests all interested vendors to submit proposals to provide software, storage,

More information

Introduction. Our Services

Introduction. Our Services Introduction RCMT IT Solutions is a global provider of Custom Software, Infrastructure Technology and Managed Solutions. Offering extensive consulting expertise and professional mastery of the latest technologies,

More information

Dublin City University

Dublin City University Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset

More information

Criminal Justice Information Services (CJIS) Security Policy

Criminal Justice Information Services (CJIS) Security Policy U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.3 Prepared by: CJIS Information

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Oracle Data Integrator and Oracle Warehouse Builder Statement of Direction

Oracle Data Integrator and Oracle Warehouse Builder Statement of Direction First Published January 2010 Updated May 2011 Oracle Data Integrator and Oracle Warehouse Builder Statement of Direction Disclaimer This document in any form, software or printed matter, contains proprietary

More information

RFP 2015-08 Call Center Services Final Response to Questions 9/4/15. RFP Text Question Answer

RFP 2015-08 Call Center Services Final Response to Questions 9/4/15. RFP Text Question Answer Question # RFP Section 1 3.3.7.g Projects Tasks, Facilities Page # 17, 18 RFP Text Question Answer g) To the extent that parties mutually agree in order to provide services under the contract, at the Covered

More information

Technology Consulting. Infrastructure Consulting: Next-Generation Data Center

Technology Consulting. Infrastructure Consulting: Next-Generation Data Center Technology Consulting Infrastructure Consulting: Next-Generation Data Center Page Next-generation Heading data centers: Page Sub Title Provisioning IT services for high performance Elasticity is not the

More information

City of Fayetteville, Arkansas Page 1 of 1

City of Fayetteville, Arkansas Page 1 of 1 City of Fayetteville, Arkansas 113 West Mountain Street Fayetteville, AR 72701 (479) 575-8323 Legislation Text File #: 2015-0361, Version: 1 SHI, INC A RESOLUTION TO AUTHORIZE A CONTRACT WITH SHI, INC.

More information

The following questions and responses have been amended from those previously answered on Clarification No. 1, dated August 19, 2014:

The following questions and responses have been amended from those previously answered on Clarification No. 1, dated August 19, 2014: DALLAS/FORT WORTH INTERNATIONAL AIRPORT September 5, 2014 CLARIFICATIONS Re: - Access Control Management System, Deadline for Proposal Submittal: September 22, 2014 at 11:00 a.m. (Central Time) The following

More information

United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)

United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy

More information

SUMMARY OF LAW AND POLICY PROGRAM ADVISORY COMMITTEE MEETING. Saturday, January 24, 2004 Las Vegas, Nevada

SUMMARY OF LAW AND POLICY PROGRAM ADVISORY COMMITTEE MEETING. Saturday, January 24, 2004 Las Vegas, Nevada SUMMARY OF LAW AND POLICY PROGRAM ADVISORY COMMITTEE MEETING Saturday, January 24, 2004 Las Vegas, Nevada The Law and Policy Program Advisory Committee (PAC) meeting was called to order at 9:30 a.m. at

More information

ILLINOIS REGISTER DEPARTMENT OF STATE POLICE NOTICE OF ADOPTED RULES

ILLINOIS REGISTER DEPARTMENT OF STATE POLICE NOTICE OF ADOPTED RULES TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: PART 1240 LAW ENFORCEMENT AGENCIES DATA SYSTEM (LEADS) Section 1240.10 Introduction 1240.20 The LEADS Advisory Policy Board (APB)

More information

Product Testing Programs

Product Testing Programs Catalog of USG Product Programs Version 1.0 November 15, 2010 NSTC Subcommittee on s and Identity Management 1. Introduction This Catalog of USG Product Programs (Catalog) supplements the Registry of USG,

More information

Managing Vendors on Procurement Management Portal

Managing Vendors on Procurement Management Portal Managing Vendors on Procurement Management Portal Contents 1.0 Vendor registration... 4 1.1 Temporary Registration.... 4 1.2 Registration Verification... 5 1.3 Terms and Conditions... 5 1.4 Full Registration

More information

REQUEST FOR INFORMATION # 31603-15001 AMENDMENT # 1 FOR LAW ENFORCEMNT RECORDS MANAGEMENT SYSTEM

REQUEST FOR INFORMATION # 31603-15001 AMENDMENT # 1 FOR LAW ENFORCEMNT RECORDS MANAGEMENT SYSTEM STATE OF TENNESSEE Alcohol Beverage Commission REQUEST FOR INFORMATION # 31603-15001 AMENDMENT # 1 FOR LAW ENFORCEMNT RECORDS MANAGEMENT SYSTEM DATE: JUNE 3, 2015 RFI # 31603-15001 IS AMENDED AS FOLLOWS:

More information

Software Systems Consultants Inc. IT Solutions & Staffing Services

Software Systems Consultants Inc. IT Solutions & Staffing Services Software Systems Consultants Inc. IT Solutions & Staffing Services 137 Carter Court SW Suite 107 Vienna VA, 22180 703.597.4847 Fax 1.877.256.9979 WWW.SSCI-IT.COM wsyriani@ssci-it.com Since it s inception,

More information

Transportation Solutions Built on Oracle Transportation Management. Enterprise Solutions

Transportation Solutions Built on Oracle Transportation Management. Enterprise Solutions Transportation Solutions Built on Oracle Transportation Management Enterprise Solutions Optimizing transportation operations and ensuring improved customer service Today s complex and challenging business

More information

Defense Security Service

Defense Security Service Defense Security Service Electronic Fingerprint Capture Options for Industry Version 2.0 January 2013 Issuing Office: Defense Security Service Russell Knox Building 27130 Telegraph Rd Quantico VA 22134

More information

Department of Homeland Security

Department of Homeland Security Department of Homeland Security Biometrics Overview Neal Latta US-VISIT IDENT Program Manager 1 Importance of Biometric Standards in Post 9/11 Environment Dramatic Increase in Utilization of Biometric

More information

And Take a Step on the IG Career Path

And Take a Step on the IG Career Path How to Develop a PCI Compliance Program And Take a Step on the IG Career Path Andrew Altepeter Any organization that processes customer payment cards must comply with the Payment Card Industry s Data Security

More information

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of

More information

Helping Businesses to Leverage the Power of Managed Services

Helping Businesses to Leverage the Power of Managed Services Helping Businesses to Leverage the Power of Managed Services Customer Profile Country or Region: New Jersey, North Carolina, Florida, Texas, California, Maryland Industry: News This company is a leading

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

Needs & Applications of Latents at FBI/CJIS

Needs & Applications of Latents at FBI/CJIS Federal Bureau of Investigations (FBI) Criminal Justice Information Services (CJIS) Division Needs & Applications of Latents at FBI/CJIS B. Scott Swann Supervisory IT Specialist / Software Engineer New

More information

An Automated System for Transforming National Criminal History Records into Statistical Databases

An Automated System for Transforming National Criminal History Records into Statistical Databases U.S. Department of Justice Office of Justice Programs Presented by Howard N. Snyder Deputy Director Bureau of Justice Statistics December 16, 2015 An Automated System for Transforming National Criminal

More information

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Cloud Computing: Contracting and Compliance Issues for In-House Counsel International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,

More information

Planning, Deploying, and Managing an Enterprise Project Management Solution

Planning, Deploying, and Managing an Enterprise Project Management Solution Planning, Deploying, and Managing an Enterprise Project Management Solution Course 2732 Five days Instructor-led Introduction The goal of this five-day, instructor-led course is to provide systems engineers

More information

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department

More information

William F. Leo Forensic Identification Consultant www.fingerprintidentification.net. Credentials

William F. Leo Forensic Identification Consultant www.fingerprintidentification.net. Credentials William F. Leo Forensic Identification Consultant www.fingerprintidentification.net Bill@FingerprintIdentification.net Credentials Master of Science Degree Criminology Indiana State University Emphasis

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

ADDENDUM 5 TO APPENDIX 6 TO SCHEDULE 3.3

ADDENDUM 5 TO APPENDIX 6 TO SCHEDULE 3.3 ADDENDUM 5 TO APPENDIX 6 TO SCHEDULE 3.3 TO THE Statement of Technical Approach for Messaging Services Northrop Grumman s approach will improve available messaging services, collaboration and workflow

More information

Alien Criminal Response Information Management System (ACRIMe) April 22, 2010

Alien Criminal Response Information Management System (ACRIMe) April 22, 2010 for Alien Criminal Response Information Management System (ACRIMe) April 22, 2010 Contact Point James A. Dinkins, Director Office of Investigations U.S. Immigration & Customs Enforcement (202) 732-5100

More information

Advanced Solutions of Microsoft SharePoint Server 2013 Course 20332A; 5 Days, Instructor-led

Advanced Solutions of Microsoft SharePoint Server 2013 Course 20332A; 5 Days, Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Advanced Solutions of Microsoft SharePoint Server 2013 Course 20332A; 5 Days,

More information

The Leading Provider of Identity Solutions and Services in the U.S.

The Leading Provider of Identity Solutions and Services in the U.S. THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that

More information

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:

More information

Planning, Implementing and Managing a Microsoft SharePoint 2003 Infrastructure

Planning, Implementing and Managing a Microsoft SharePoint 2003 Infrastructure Planning, Implementing and Managing a Microsoft SharePoint 2003 Infrastructure Course 8036 - Three days - Instructor-led - Hands on Introduction This instructor-led course provides students with the knowledge

More information

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project. chair John Chiang member Jerome E. Horton member Ana J. Matosantos August 27, 2012 To: Potential Vendors Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event

More information

STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009

STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009 STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009 Following is a voluntary guideline issued by the State Records

More information

Fusion Center Technology Resources Road Map: Elements of an Enterprise Architecture for State and Major Urban Area Fusion Centers

Fusion Center Technology Resources Road Map: Elements of an Enterprise Architecture for State and Major Urban Area Fusion Centers Fusion Center Technology Resources Road Map: Elements of an Enterprise for State and Major Urban Area Fusion Centers General Overview The function of a fusion center is to provide a collection, analysis,

More information

NC CJIN Governing Board. 13 October, 2011. George A. White

NC CJIN Governing Board. 13 October, 2011. George A. White Advanced Authentication NC CJIN Governing Board 13 October, 2011 George A. White FBI CJIS ISO Brief Policy History Two year development Fully vetted by all state representation Criminal and civil Requirements

More information

U.S. Department of Housing and Urban Development Data Center Consolidation Plan

U.S. Department of Housing and Urban Development Data Center Consolidation Plan U.S. Department of Housing and Urban Development Data Center Consolidation Plan FY12 Final Plan September 30, 2011 1 P a g e TABLE OF CONTENTS DOCUMENT INFORMATION TABLE OF CONTENTS... 2 TABLE of TABLES...

More information

SOUTHERN CALIFORNIA GAS COMPANY ADVANCED METERING INFRASTRUCTURE CHAPTER IV

SOUTHERN CALIFORNIA GAS COMPANY ADVANCED METERING INFRASTRUCTURE CHAPTER IV Application No.: A.0-0-0 Exhibit No.: SCG Date: March, 00 Witness: Christopher R. Olmsted SOUTHERN CALIFORNIA GAS COMPANY ADVANCED METERING INFRASTRUCTURE CHAPTER IV INFORMATION SYSTEMS, APPLICATION DEVELOPMENT

More information

KMS Implementation Roadmap

KMS Implementation Roadmap KMS Implementation Roadmap Sample Excerpt Prepared by: The Knowledge Compass, Inc. TABLE OF CONTENTS 1. EXECUTIVE SUMMARY 5 1.1 Overview 5 1.2 Project Goals & Objectives 5 1.3 Implementation Approach 5

More information

CONSULTING SERVICES Financial Systems Implementation Support

CONSULTING SERVICES Financial Systems Implementation Support CONSULTING SERVICES Financial Systems Implementation Support Financial Systems Implementation Support Corporate finance organizations are facing unparalleled pressure to implement technology and improve

More information

VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION

VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION 1. Purpose This Agreement, entered into by the Hawaii Criminal Justice Data Center (hereinafter

More information

Tackling ERP Modernization: A New Approach for State and Local Government

Tackling ERP Modernization: A New Approach for State and Local Government Tackling ERP Modernization: A New Approach for State and Local Government Today s Speakers Joe Morris Lead Analyst Center for Digital Government Government Technology Mike Bailey Finance Director City

More information

We want to clarify for all vendors our definition of SaaS and Managed Services.

We want to clarify for all vendors our definition of SaaS and Managed Services. RFP 6045 PeopleSoft Hosting Services BGSU RESPONSE Questions and Answers Special Note: We want to clarify for all vendors our definition of SaaS and Managed Services. SaaS would be using vendor s instances

More information

CITY OF FRISCO PURCHASING DIVISION

CITY OF FRISCO PURCHASING DIVISION May 31, 2013 Addendum #1 Questions and Answers RFP #1306-059 Enterprise Discovery for Electronic Records Questions and Answers CITY OF FRISCO PURCHASING DIVISION 1. The RFP states to use either AC, FR,

More information

Clarity Infrastructure Management helps network operators to plan and document the change to their networks

Clarity Infrastructure Management helps network operators to plan and document the change to their networks Clarity Infrastructure Management helps network operators to plan and document the change to their networks clarity.com 2 Clarity Simplifying Operations Cost effective and timely network rollouts or upgrades

More information

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: OCCUPATIONAL GROUP: Information Technology CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: This family of positions provides security and monitoring for the transmission of information in voice, data,

More information

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Mr. Rojas has over 25 years of information systems consulting, supervisory, managerial and executive experience in various industries. He is considered

More information

INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE. Guiding Principles on Cloud Computing in Law Enforcement

INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE. Guiding Principles on Cloud Computing in Law Enforcement INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE Guiding Principles on Cloud Computing in Law Enforcement Cloud computing technologies offer substantial potential benefits to law enforcement and government

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

ABCs of the FBI Training Academy What it costs to train a Special Agent. March 16, 2011

ABCs of the FBI Training Academy What it costs to train a Special Agent. March 16, 2011 ABCs of the FBI Training Academy What it costs to train a Special Agent March 16, 2011 State of the Art Law Enforcement Training Facility May 1972, the modernized FBI Academy was opened to train Special

More information