January SEARCH Membership Meeting
|
|
- Clarence Franklin
- 7 years ago
- Views:
Transcription
1 January 2013 SEARCH Membership Meeting
2 Best Practices = Survival Skills: Figure out what CJIS is doing and copy it.ansi NIST ITL 2011, EBTS 10.0 If you are confused, call Charlie Schaeffer (FDLE) and Mike Lesko (Texas DPS) Can you get where you want to go with your legacy vendor? The participants who start the project aren t necessarily the ones who complete the project preserve the record! Make effective use of outsourcing for project Mgt and Technical Specs Don t Pave COWPATHS! 2
3 Perfect is the Enemy of Done! Insisting on perfection often results in no improvement at all Voltaire? 3
4 4
5 Feature Present 2012 Capability Projected 2020 Capability Daily Ten print Submissions 7,000 11,000 Daily Latent Submissions 500 3,000 Ten print Database Size 7,000,000 26,000,000 Multi Event Database-Up to 4 1 st QTR Exists Events 2014 Palm Database Size 500,000 4,750,000 WIN Connected Ten print 29,000,000 40,000,000 Database Size 5
6 WIN will have a Disaster Recovery Capability DR System is being built in Rancho Cordova, CA System will be deployed to NEC Irving Texas 6
7 WIN Stature within the CJIS Community: WIN is a Private Entity providing services to criminal justice agencies for the Administration of Criminal Justice: Subject to 28 CFR as a private entity. Like Nlets Maintains CJIS Security Addendums with WIN Members Maintains CJIS Security Addendum with NEC Maintains WIN Security Policy which adopts CJIS Security Policy WIN has an assigned ORI 7
8 WIN Business Model: (c)(3) Non Profit formed in 1989 (Nevada Corp) 2. Governed by a Board of Directors from the 9 Member States 3. WIN-Operations Group ID Bureau Managers 4. WIN Staff in Sacramento manage the day to day business 5. WIN Provides an AFIS Service Bureau utilized by 8 Western State Repositories. 6. WIN Provides a Proprietary (Non-NIST) search network to the California DOJ, California Locals and Las Vegas Metro. 7. WIN is programmed to submit and receive NIST Ten Print and Latent INBOUND OUTBOUND Searches. 8
9 WIN Management Model: Minimize Staff Optimize Outsourcing of Required Services WIN recently completed a High Profile Bid NEC continues as ABIS service provider WIN Contracts with Nlets for Network Management WIN Contracts with AWARE for EBTS related Support WIN Contracts with a CPA for Accounting Services 9
10 WIN Management Model (Contd): WIN Presently has 3 Staff: Ken Bischoff CEO Dusty Clark Training and QA Manager Gary Goad Member Services Manager Contract with Technical and other Expertise as required: HAI IAFIS, NGI, RCMP, IRAQ Acquisitions MTG Management Consultants Planning, Procurement Downey Brand Legal Support 10
11 How WIN Got Started: Leadership from Western Members of the Former NCIC APB Leadership from Western States Information Network (RISS) Resolution from the Western Legislative Conference Resolution from the Conference of Western Attorneys General Legal Assistance from State Attorneys Procurement Assistance from State Entities RFP/Specifications Assistance from California DOJ 11 Volunteerism from the original state members
12 WIN Governing Documents: Articles of Incorporation Corporation Bylaws User Agreements Central Site Member Interface State Member Local Reciprocal Search Agreement Service Provider Contracts 12
13 WIN System Documentation Electronic Biometric Transmission Specification NIST Device Configuration Guide 13 Technical System Specifications System Design Interface NIST Submission, NGI, CCH Continuity of Operations Plan Training Plan, User Guides In Plant Security Plan Implementation Statement of Work Operational Statement of Work
14 Current Activities: 1.Support legacy platform 14 2.Build and Deploy New Platform: Adopt new NGI Functionality Migrate to multi-event, Fusion Matching Deploy Disaster Recovery Site Work with membership to participate in Factory, Site and User acceptance. Update EBTS to comport with updated environment. Upgrade Network, CJIS WAN Backup, Disaster Recovery/Failover Links
15 Nlets Support Role: 1.Network Management 2.Device acquisition configuration 3.CJIS Security Compliance 4.Network Documentation 5.Member Troubleshooting Support 15
16 AWARE Support Role: On call EBTS technical support Maintain WIN EBTS Verification Software Maintain WIN EBTS Reference Guides Capable of providing State Specific Support Local EBTS field requirements High volume integrated Scanners Local Workflow Management (BIOsp) 16
17 17
18 What were we thinking? A decade prior to IAFIS, No National Standards No Interfaces Submission, CCH, IAFIS, 9.6 Baud Implement Nations first Multi-State AFIS System Search CalDOJ, California Locals, Washington, Alaska. WIN Bid for initial system, NEC Awarded Bid. 18
19 What are we thinking? WIN continues to be relevant. Perhaps even more so today: INTEROPERABILITY - See National Academy of Sciences (NAS) and Latent Print Interoperability reports: Strengthening Forensic Science in the United States: A Path Forward, Latent Print Interoperability: State and Local Perspectives by NOBLIS WIN s Next Generation ABIS adopts the new latent extended feature set interoperability standard. 19
20 State Repositories Have Common Needs that can Be leveraged: FBI Next Generation Identification Criminal History Interface Civil and Criminal event capture Mobile ID Security CJIS Security Compliance Support for in state local agencies Support for State Criminal Justice System 20
21 National Standards apply that can be leveraged: All states must comply with NIST/EBTS to submit to NGI. We are already using a shared standard. All States use FBI EBTS Transactions. Record Types are the same. WIN provides a standards based NIST Submission Interface WIN Provides a Standards based CCH Interface WIN Provides a Standards based NGI Interface WIN Provides flexibility within these interfaces 8 states are successfully using these same standards and interfaces Build Once..Deploy Many 21
22 Future Growth: WIN TEXAS DPS Interface WIN Architecture Can accommodate new members Concept of Scope 22
23 Questions? 23
Best Practice Procedures for The Exchange of Latent Identification Services
Best Practice Procedures for The Exchange of Latent Identification Services The Texas Experience Mike Lesko Texas DPS Addressing the Needs of the Texas Latent User Latent exchange must: Be Inexpensive
More informationClassification: CJIS Program Manager (UCR/Auditing) Title Code: V00681 Pay Range: 34
Pay Range: 34 POSITION SUMMARY: This is advanced professional, technical, and consultative work that involves developing, organizing, implementing, and directing all activities associated with a specific
More informationSystem availability will be limited during this initiative. Accordingly, the CJIS Division will provide advanced notice of sporadic system
}-I '. MEMORANDUM OF UNDERSTANDING. BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND THE STATE OF HAWAII DEPARTMENT OF THE ATTORNEY GENERAL FOR THE INTERSTATE PHOTO SYSTEM FACIAL RECOGNITION PILOT GENERAL
More informationExtended Feature Set Profile Specification
NIST Special Publication 1134 Extended Feature Set Profile Specification Will Chapman Austin Hicklin George Kiebuzinski Peter Komarinski John MayerSplain Melissa Taylor Rachel Wallner http://dx.doi.org/10.6028/nist.sp.1134
More informationPRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS
PRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS Identification technology has progressed from just being fingerprint matching
More informationCJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION
1. Purpose: CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION The intent of this agreement and the policies and procedures herein is to facilitate compliance in Colorado with
More informationAlan Ferretti CJIS Information Security Officer
Alan Ferretti CJIS Information Security Officer AGENDA What is CJIS? What is the APB? What is new in the latest version of the CJIS Security Policy? Advanced Authentication change Mobile policy for Tablets
More informationSouth Carolina Law Enforcement Division Criminal Justice Information System (CJIS)
South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) USER AGREEMENT AND SYSTEM RESPONSIBILITIES Introduction The South Carolina Criminal Justice Information and Communications
More informationDepartment of Veterans Affairs VHA DIRECTIVE 2011-005 Veterans Health Administration Washington, DC 20420 February 8, 2011
Department of Veterans Affairs VHA DIRECTIVE 2011-005 Veterans Health Administration Washington, DC 20420 RADIOLOGY PICTURE ARCHIVING AND COMMUNICATION SYSTEMS (PACS) 1. PURPOSE: This Veterans Health Administration
More informationArkansas. California. Connecticut. Delaware
Arkansas California Yes, This would include Youth Organizations and Human Resource Agencies pursuant to California Penal code Section 11105.3 Yes Connecticut Delaware Yes, but no one is doing is yet. need
More informationRapid DNA Analysis in the Police Booking Suite: FBI Initiative for Reference Sample Point-of-Collection Analysis
Rapid DNA Analysis in the Police Booking Suite: FBI Initiative for Reference Sample Point-of-Collection Analysis 13 th European Forensic DNA Working Group Meeting Krakow, Poland May 10, 2012 Clark Jaw
More informationMission Statement. Provide comprehensive vendor and project management solutions tailored specifically to our clients needs.
Mission Statement Provide comprehensive vendor and project management solutions tailored specifically to our clients needs. Company History 1997 Founded Icon Information Consultants, LP Market Focus: Contingent
More informationWestern Service Center
Western Service Center Ken W. Canziani, IAAI-CFI Special Investigator Sacramento/Bay Area California Reno/Sparks, Nevada 916-922-0240 kcanziani@uis-usa.com EDUCATION: Sacramento State University Sacramento,
More informationCJIS Information Technology Security Audit (ITSA) 2015 Program Update
CJIS Information Technology Security Audit (ITSA) 2015 Program Update Greg Verharst CJIS Information Security Officer Greg.Verharst@state.or.us (503) 934-2335 The 4 W s of CJIS Audits Who receives Information
More informationYEAR TWO. Total Credits 3 Total Credits 6 Total Credits 3 Total Credits 6 Total Credits 6
FALL 1 START (Online) WINTER 1 (FIRST 8 WEEKS) WINTER 2 (SECOND 8 WEEKS) PUB 5409 3 PUB 5419 3 PUB 5429 3 PUB 5439 3 PUB 5459 3 CJI 0510 3 CJI 0520 3 PUB 5469 3 Total Credits 3 Total Credits 6 Total Credits
More informationCJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.
CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. Alan Ferretti CJIS Information Security Officer Texas Department of Public Safety CJIS Security Policy version 5.2: On 8/9/2013
More informationIntroduction DEFINITIONS
Pennsylvania Commission on Crime and Delinquency Guidelines and Technology Standards for the Collection and Transmission of Booking Center Captured Offenders' Identification Information Table of Contents
More informationMoving Service Management to SaaS Key Challenges and How Nimsoft Service Desk Helps Address Them
Moving Service Management to SaaS Key Challenges and How Nimsoft Service Desk Helps Address Them Table of Contents Executive Summary... 3 Introduction: Opportunities of SaaS... 3 Introducing Nimsoft Service
More informationMORPHO CRIMINAL JUSTICE SUITE
MORPHO CRIMINAL JUSTICE SUITE FULL RANGE OF PRODUCTS DEDICATED TO CRIMINAL JUSTICE MISSIONS 2 1 3 Morpho provides law enforcement with a wide range of products to support criminal investigation, background
More information1 WHAT IS IPSFRP? 2 WHO CAN USE IPSFRP? 3 HOW DO I USE IPSFRP?
i I, I 1 WHAT IS IPSFRP? The Interstate Photo System Facial Recognition Pilot (IPSFRP) accepts Facial Recognition Search (FRS) requests and returns a s~ore-ranked list of candidates in the Search Results
More informationCJIS Division Update
CJIS Division Update Oregon State Police Criminal Justice Information Services Division Kendele Miyasaki, Training Coordinator Russ Hoskins, Training Specialist CJIS/LEDS Contact Information Criminal Justice
More informationTechnical Assistance Guide No. 05-13 PDMP Data Management Solutions
Technical Assistance Guide No. 05-13 PDMP Data Management Solutions April 25, 2013 Introduction During this time of a slow and struggling economy, public agencies are asked to do more with less. As state
More informationSubmitted to: Service Definition Document for Database Management for IT Infrastructure Management
Submitted to: Service Definition Document for Database Management for IT Infrastructure Management Table of Contents 1 Service Description... 3 2 Support Process and Methodology... 10 3 Standard Questionnaire...
More informationAdapting BJS s web-based recidivism analysis tool for state-level queries
For Internal Use Only Adapting BJS s web-based recidivism analysis tool for state-level queries Matt Durose Statistician Bureau of Justice Statistics National Corrections Reporting Program Data Providers
More informationOverview of Current Criminal Justice Information Systems
Overview of Current Criminal Justice Information Systems by James X. Dempsey Center for Democracy & Technology www.cdt.org Criminal justice information systems can be divided roughly into two categories:
More informationCriminal Justice Information Services (CJIS) Security Policy
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.4 Prepared by: CJIS Information
More informationCriminal Justice Information Services (CJIS) Security Policy
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.0 Prepared by: CJIS Information
More informationHosting JDE EnterpriseOne in the Cloud Hear how one company went to the cloud
Hosting JDE EnterpriseOne in the Cloud Hear how one company went to the cloud October 2015 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T Agenda Organizational
More informationSecurity in Fax: Minimizing Breaches and Compliance Risks
Security in Fax: Minimizing Breaches and Compliance Risks Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information
More informationREQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES
CITY OF RICHLAND HILLS, TEXAS REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by the City of Richland Hills for Information Technology Support Services. Interested
More informationSIP-ing? Pipeline Articles www.contactcenterpipeline.com
tech line / jul 2013 Time to Start SIP-ing? Can a SIP-based solution add value for your contact center? A look at the key opportunities and considerations. By Ken Barton, and Matt Morey, Strategic Contact
More informationIdentity Management: Going Beyond Biometrics! Presented by: JOSEPH J. ATICK, Ph.D. PRESIDENT AND CEO
Identity Management: Going Beyond Biometrics! Presented by: JOSEPH J. ATICK, Ph.D. PRESIDENT AND CEO Agenda I. Identity Management vs. Biometrics II. Identity Frameworks III. Program/System Integration
More informationFUNCTIONAL AREA 12. Network Administration (NET)
FUNCTIONAL AREA 12 Network Administration (NET) Incumbents in this functional area address interoperability issues related to hardware, software, and connectivity of communications such as cable, fiber
More informationACQUISITION OF COMPUTER HARDWARE, SOFTWARE AND SERVICES
Metro Met..po'"'" T""'porta"O" Autho." One Gateway Plaza Los Angeles, CA 90012-2952 213. 922. 2000 - metro. net FINANCE & BUDGET COMMITTEE AUGUST 19, 2004 SUBJECT: ACTION: ACQUISITION OF COMPUTER HARDWARE,
More informationThe Dos and Don'ts of Choosing a Telephone System Upgrade: Including the DMS Options
The Dos and Don'ts of Choosing a Telephone System Upgrade: Including the DMS Options With Phillip Sherman, President of Telecom Advisors Group, Inc. Moderated by Mike Bowers, Executive Editor of DealersEdge
More informationNext Generation Identification Program (NGI) Rap Back Service
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Next Generation Identification Program (NGI) Rap Back Service Criminal Justice Policy and Implementation
More informationCriminal Justice Information Services (CJIS) Security Policy
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.5 06/01/2016 Prepared by:
More informationSenate Bill 9 Background Checks for Education A Reference Guide January 1, 2008
Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008 TABLE OF CONTENTS SB9 OVERVIEW... 3 DEFINITIONS... 4 THE FINGERPRINTING PROCESS:... 6 SUMMARY OF REQUIREMENTS FROM THE BILL...
More informationAdvanced IT Pro Course for Office SharePoint Server 2007 and SharePoint Services 3.0
Advanced IT Pro Course for Office SharePoint Server 2007 and SharePoint Services 3.0 50047: Advanced IT Pro Course for Microsoft Office SharePoint Server 2007 and Windows SharePoint Services 3.0 (5 Days)
More informationRequest of Expressions of Interest For Information Technology Consulting Firm
Election Commission Secretariat Preparation of Electoral Roll with Photographs and Facilitating the Issuance of National Identity Card Project Islamic Foundation Building Agargaon, Dhaka. No. PERP&FINIDC/Ops/040/480
More informationSouth Carolina Law Enforcement Division Criminal Justice Information System (CJIS)
South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) USER AGREEMENT AND SYSTEM RESPONSIBILITIES Introduction The South Carolina Criminal Justice Infonnation and Communications
More informationTexas State Library and Archives Commission. Information Technology Detail. August 26, 2010
Texas State Library and Archives Commission Information Technology Detail 82 th Regular Session, Agency Submission, Version 1 August 26, 2010 PAGE: 1 of 6 5005 ACQUISITN INFO RES TECH 4 Computer Resources/Network
More informationDepartment-wide Systems and Capital Investment Program
Department-wide Systems and Capital Investment Program Mission Statement The Department-wide Systems and Capital Investments Program (DSCIP) is authorized to be used by or on behalf of the Treasury Department
More informationVendor Questions and Responses
Vendor Questions and Responses 1. What server are you planning to use for this environment? IBM, Microsoft, Linux/Unix The RFP requests all interested vendors to submit proposals to provide software, storage,
More informationIntroduction. Our Services
Introduction RCMT IT Solutions is a global provider of Custom Software, Infrastructure Technology and Managed Solutions. Offering extensive consulting expertise and professional mastery of the latest technologies,
More informationDublin City University
Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset
More informationCriminal Justice Information Services (CJIS) Security Policy
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.3 Prepared by: CJIS Information
More informationValidating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
More informationOracle Data Integrator and Oracle Warehouse Builder Statement of Direction
First Published January 2010 Updated May 2011 Oracle Data Integrator and Oracle Warehouse Builder Statement of Direction Disclaimer This document in any form, software or printed matter, contains proprietary
More informationRFP 2015-08 Call Center Services Final Response to Questions 9/4/15. RFP Text Question Answer
Question # RFP Section 1 3.3.7.g Projects Tasks, Facilities Page # 17, 18 RFP Text Question Answer g) To the extent that parties mutually agree in order to provide services under the contract, at the Covered
More informationTechnology Consulting. Infrastructure Consulting: Next-Generation Data Center
Technology Consulting Infrastructure Consulting: Next-Generation Data Center Page Next-generation Heading data centers: Page Sub Title Provisioning IT services for high performance Elasticity is not the
More informationCity of Fayetteville, Arkansas Page 1 of 1
City of Fayetteville, Arkansas 113 West Mountain Street Fayetteville, AR 72701 (479) 575-8323 Legislation Text File #: 2015-0361, Version: 1 SHI, INC A RESOLUTION TO AUTHORIZE A CONTRACT WITH SHI, INC.
More informationThe following questions and responses have been amended from those previously answered on Clarification No. 1, dated August 19, 2014:
DALLAS/FORT WORTH INTERNATIONAL AIRPORT September 5, 2014 CLARIFICATIONS Re: - Access Control Management System, Deadline for Proposal Submittal: September 22, 2014 at 11:00 a.m. (Central Time) The following
More informationUnited States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)
for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy
More informationSUMMARY OF LAW AND POLICY PROGRAM ADVISORY COMMITTEE MEETING. Saturday, January 24, 2004 Las Vegas, Nevada
SUMMARY OF LAW AND POLICY PROGRAM ADVISORY COMMITTEE MEETING Saturday, January 24, 2004 Las Vegas, Nevada The Law and Policy Program Advisory Committee (PAC) meeting was called to order at 9:30 a.m. at
More informationILLINOIS REGISTER DEPARTMENT OF STATE POLICE NOTICE OF ADOPTED RULES
TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: PART 1240 LAW ENFORCEMENT AGENCIES DATA SYSTEM (LEADS) Section 1240.10 Introduction 1240.20 The LEADS Advisory Policy Board (APB)
More informationProduct Testing Programs
Catalog of USG Product Programs Version 1.0 November 15, 2010 NSTC Subcommittee on s and Identity Management 1. Introduction This Catalog of USG Product Programs (Catalog) supplements the Registry of USG,
More informationManaging Vendors on Procurement Management Portal
Managing Vendors on Procurement Management Portal Contents 1.0 Vendor registration... 4 1.1 Temporary Registration.... 4 1.2 Registration Verification... 5 1.3 Terms and Conditions... 5 1.4 Full Registration
More informationREQUEST FOR INFORMATION # 31603-15001 AMENDMENT # 1 FOR LAW ENFORCEMNT RECORDS MANAGEMENT SYSTEM
STATE OF TENNESSEE Alcohol Beverage Commission REQUEST FOR INFORMATION # 31603-15001 AMENDMENT # 1 FOR LAW ENFORCEMNT RECORDS MANAGEMENT SYSTEM DATE: JUNE 3, 2015 RFI # 31603-15001 IS AMENDED AS FOLLOWS:
More informationSoftware Systems Consultants Inc. IT Solutions & Staffing Services
Software Systems Consultants Inc. IT Solutions & Staffing Services 137 Carter Court SW Suite 107 Vienna VA, 22180 703.597.4847 Fax 1.877.256.9979 WWW.SSCI-IT.COM wsyriani@ssci-it.com Since it s inception,
More informationTransportation Solutions Built on Oracle Transportation Management. Enterprise Solutions
Transportation Solutions Built on Oracle Transportation Management Enterprise Solutions Optimizing transportation operations and ensuring improved customer service Today s complex and challenging business
More informationDefense Security Service
Defense Security Service Electronic Fingerprint Capture Options for Industry Version 2.0 January 2013 Issuing Office: Defense Security Service Russell Knox Building 27130 Telegraph Rd Quantico VA 22134
More informationDepartment of Homeland Security
Department of Homeland Security Biometrics Overview Neal Latta US-VISIT IDENT Program Manager 1 Importance of Biometric Standards in Post 9/11 Environment Dramatic Increase in Utilization of Biometric
More informationAnd Take a Step on the IG Career Path
How to Develop a PCI Compliance Program And Take a Step on the IG Career Path Andrew Altepeter Any organization that processes customer payment cards must comply with the Payment Card Industry s Data Security
More informationPerspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009
Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of
More informationHelping Businesses to Leverage the Power of Managed Services
Helping Businesses to Leverage the Power of Managed Services Customer Profile Country or Region: New Jersey, North Carolina, Florida, Texas, California, Maryland Industry: News This company is a leading
More informationPRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
More informationNeeds & Applications of Latents at FBI/CJIS
Federal Bureau of Investigations (FBI) Criminal Justice Information Services (CJIS) Division Needs & Applications of Latents at FBI/CJIS B. Scott Swann Supervisory IT Specialist / Software Engineer New
More informationAn Automated System for Transforming National Criminal History Records into Statistical Databases
U.S. Department of Justice Office of Justice Programs Presented by Howard N. Snyder Deputy Director Bureau of Justice Statistics December 16, 2015 An Automated System for Transforming National Criminal
More informationCloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
More informationPlanning, Deploying, and Managing an Enterprise Project Management Solution
Planning, Deploying, and Managing an Enterprise Project Management Solution Course 2732 Five days Instructor-led Introduction The goal of this five-day, instructor-led course is to provide systems engineers
More informationOVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
More informationWilliam F. Leo Forensic Identification Consultant www.fingerprintidentification.net. Credentials
William F. Leo Forensic Identification Consultant www.fingerprintidentification.net Bill@FingerprintIdentification.net Credentials Master of Science Degree Criminology Indiana State University Emphasis
More informationInformation Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
More informationADDENDUM 5 TO APPENDIX 6 TO SCHEDULE 3.3
ADDENDUM 5 TO APPENDIX 6 TO SCHEDULE 3.3 TO THE Statement of Technical Approach for Messaging Services Northrop Grumman s approach will improve available messaging services, collaboration and workflow
More informationAlien Criminal Response Information Management System (ACRIMe) April 22, 2010
for Alien Criminal Response Information Management System (ACRIMe) April 22, 2010 Contact Point James A. Dinkins, Director Office of Investigations U.S. Immigration & Customs Enforcement (202) 732-5100
More informationAdvanced Solutions of Microsoft SharePoint Server 2013 Course 20332A; 5 Days, Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Advanced Solutions of Microsoft SharePoint Server 2013 Course 20332A; 5 Days,
More informationThe Leading Provider of Identity Solutions and Services in the U.S.
THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that
More informationWilliamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:
More informationPlanning, Implementing and Managing a Microsoft SharePoint 2003 Infrastructure
Planning, Implementing and Managing a Microsoft SharePoint 2003 Infrastructure Course 8036 - Three days - Instructor-led - Hands on Introduction This instructor-led course provides students with the knowledge
More informationSubject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.
chair John Chiang member Jerome E. Horton member Ana J. Matosantos August 27, 2012 To: Potential Vendors Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event
More informationSTATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009
STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009 Following is a voluntary guideline issued by the State Records
More informationFusion Center Technology Resources Road Map: Elements of an Enterprise Architecture for State and Major Urban Area Fusion Centers
Fusion Center Technology Resources Road Map: Elements of an Enterprise for State and Major Urban Area Fusion Centers General Overview The function of a fusion center is to provide a collection, analysis,
More informationNC CJIN Governing Board. 13 October, 2011. George A. White
Advanced Authentication NC CJIN Governing Board 13 October, 2011 George A. White FBI CJIS ISO Brief Policy History Two year development Fully vetted by all state representation Criminal and civil Requirements
More informationU.S. Department of Housing and Urban Development Data Center Consolidation Plan
U.S. Department of Housing and Urban Development Data Center Consolidation Plan FY12 Final Plan September 30, 2011 1 P a g e TABLE OF CONTENTS DOCUMENT INFORMATION TABLE OF CONTENTS... 2 TABLE of TABLES...
More informationSOUTHERN CALIFORNIA GAS COMPANY ADVANCED METERING INFRASTRUCTURE CHAPTER IV
Application No.: A.0-0-0 Exhibit No.: SCG Date: March, 00 Witness: Christopher R. Olmsted SOUTHERN CALIFORNIA GAS COMPANY ADVANCED METERING INFRASTRUCTURE CHAPTER IV INFORMATION SYSTEMS, APPLICATION DEVELOPMENT
More informationKMS Implementation Roadmap
KMS Implementation Roadmap Sample Excerpt Prepared by: The Knowledge Compass, Inc. TABLE OF CONTENTS 1. EXECUTIVE SUMMARY 5 1.1 Overview 5 1.2 Project Goals & Objectives 5 1.3 Implementation Approach 5
More informationCONSULTING SERVICES Financial Systems Implementation Support
CONSULTING SERVICES Financial Systems Implementation Support Financial Systems Implementation Support Corporate finance organizations are facing unparalleled pressure to implement technology and improve
More informationVOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION
VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION 1. Purpose This Agreement, entered into by the Hawaii Criminal Justice Data Center (hereinafter
More informationTackling ERP Modernization: A New Approach for State and Local Government
Tackling ERP Modernization: A New Approach for State and Local Government Today s Speakers Joe Morris Lead Analyst Center for Digital Government Government Technology Mike Bailey Finance Director City
More informationWe want to clarify for all vendors our definition of SaaS and Managed Services.
RFP 6045 PeopleSoft Hosting Services BGSU RESPONSE Questions and Answers Special Note: We want to clarify for all vendors our definition of SaaS and Managed Services. SaaS would be using vendor s instances
More informationCITY OF FRISCO PURCHASING DIVISION
May 31, 2013 Addendum #1 Questions and Answers RFP #1306-059 Enterprise Discovery for Electronic Records Questions and Answers CITY OF FRISCO PURCHASING DIVISION 1. The RFP states to use either AC, FR,
More informationClarity Infrastructure Management helps network operators to plan and document the change to their networks
Clarity Infrastructure Management helps network operators to plan and document the change to their networks clarity.com 2 Clarity Simplifying Operations Cost effective and timely network rollouts or upgrades
More informationOCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:
OCCUPATIONAL GROUP: Information Technology CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: This family of positions provides security and monitoring for the transmission of information in voice, data,
More informationErnesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA
Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Mr. Rojas has over 25 years of information systems consulting, supervisory, managerial and executive experience in various industries. He is considered
More informationINTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE. Guiding Principles on Cloud Computing in Law Enforcement
INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE Guiding Principles on Cloud Computing in Law Enforcement Cloud computing technologies offer substantial potential benefits to law enforcement and government
More informationDomain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
More informationABCs of the FBI Training Academy What it costs to train a Special Agent. March 16, 2011
ABCs of the FBI Training Academy What it costs to train a Special Agent March 16, 2011 State of the Art Law Enforcement Training Facility May 1972, the modernized FBI Academy was opened to train Special
More information