JNET & PennDOT Facial Recognition Integration

Size: px
Start display at page:

Download "JNET & PennDOT Facial Recognition Integration"

Transcription

1 JNET & PennDOT Facial Recognition Integration CATEGORY: DATA, INFORMATION & KNOWLEDGE MANAGEMENT Contact: David Naisby JNET Executive Director 5 Technology Park Harrisburg, PA (717) dnaisby@pa.gov Commonwealth of Pennsylvania Project Initiated: September 2012 Project Completed: December 2012

2 Executive Summary The Pennsylvania Justice Network (JNET) is an integrated portal that provides authorized users with access to public safety and criminal justice information from federal, state and local sources. Over 39,000 municipal, county, state and federal justice professionals use JNET to access critical information and securely conduct investigations. JNET provides role-based access to over 35 distinct applications. In addition, JNET uses a service oriented architecture (SOA) model to broker the exchange of over 600 million messages annually between business partners. The JNET infrastructure connects all 67 Pennsylvania counties, 38 state agencies, and 37 federal law enforcement agencies. JNET has deployed ground-breaking technology in the field of facial recognition. The JNET Facial Recognition System (JFRS) allows law enforcement investigators to compare images from a variety of sources, including surveillance or security video and social media sites, against a statewide criminal database containing 3.5 million photographs. A major limitation of the legacy JFRS system was that it only allowed comparison of images for previously arrested criminal offenders. At the request of the law enforcement community, JNET partnered with the Pennsylvania Department of Transportation (PennDOT) to enable JFRS searches against the statewide repository of 36 million driver s license and identification photo images. Leveraging JNET s accessibility and state-of-the-art facial recognition system with PennDOT s vast photo database has provided immediate and exponential value for all law enforcement professionals in Pennsylvania. Through this solution, investigators now have the ability to submit a photograph or image into JFRS, and compare it against approximately 40 million images using three unique search algorithms. This project was a collaborative effort between the Office of Administration, JNET, PennDOT, and the Pennsylvania Chiefs of Police Association. This effort has reduced costs, saved time, and strengthened public safety across the state.

3 3. Business Problem and Solution Description The ability to identify an unknown suspect or witness is paramount in the prosecution and prevention of crime. To support this ability, JNET deployed a facial recognition system (JFRS) that enables trained and authorized investigators to upload images for comparison against 3.5 million criminal booking photographs. JFRS provides a host of imaging tools that allow photographs to be cropped, rotated or manipulated to assist with comparison. Furthermore, JFRS employs two unique search algorithm technologies. Photographs submitted into JFRS by investigators are automatically analyzed by both search algorithms, ensuring that law enforcement benefits from multiple technologies. With JFRS deployed on JNET, the system can be made available to any law enforcement agency in Pennsylvania. Law enforcement professionals from more than 500 agencies have completed training and have access to JFRS. JFRS is able to identify similarities between the unknown person or suspect using the unique personal measurements of an individual s facial features. These measurements are compared to offender photographs captured at the time of criminal booking within the statewide database known as the Commonwealth Photo Imaging Network (CPIN). During the booking process, a photograph is captured in CPIN and a facial plate is automatically created from the individual s picture. Photographs stored in CPIN are made available to law enforcement through a web-based application on JNET called WebCPIN. Pennsylvania has over 3.5 million criminal booking photographs for comparison in JFRS. Unfortunately, this represents only a fraction of the approximately 13 million residents in the state. Without a larger database for comparison, law enforcement was limited in its ability to investigate unknown criminal suspects or suspects who have never been arrested or booked in Pennsylvania. The Pennsylvania Department of Transportation (PennDOT), which is responsible for driver s license and identification cards issued in Pennsylvania, maintains a database of over 36 million photographs. PennDOT, concerned with the issuance of duplicate or fraudulent identifications, maintains its own internal facial recognition solution. However, without the network infrastructure and connectivity of JNET, the PennDOT facial recognition solution was only available to limited users in the Pennsylvania State Police (PSP) and Pennsylvania Office of Attorney General (AG).

4 The challenge facing Pennsylvania law enforcement was how to integrate two distinct facial recognition systems with contrasting strengths. JNET had an award-winning dual algorithm technology that was readily available to all law enforcement in the commonwealth but it could only match against suspects with a prior arrest history. PennDOT had a facial recognition solution with limited availability but could match against Pennsylvania s extensive driver s license and identification card photo database. Recognizing the value of providing driver s license and identification images to JFRS investigators, the JNET Steering Committee charged JNET and PennDOT with architecting a solution that would augment law enforcement s investigative abilities while respecting policy, privacy and fiscal considerations. A workgroup was formed between the two agencies that included technical, business and vendor representation. The group immediately went to work assessing agency system capabilities, drafting requirements and - most importantly reviewing privacy and security policy considerations. Early in the process, it became clear that federal and state policies limited the ability to share photographs between the two systems. This meant that faceplates from one system could not be copied or shared with the other system. To ensure that these policy requirements were met, the team decided to use JNET s SOA infrastructure to develop a set of web services that would facilitate the loosely coupled integration of the systems. This approach proved to be simple, efficient, cost-effective and secure. When uploading the photograph of an unknown suspect into JFRS, the system automatically invokes a web service to PennDOT. This web service submits the facial plates of the unknown suspect or probe image to PennDOT for comparison against its license and identification photo database. As potential matches are identified, PennDOT then invokes a web service to return the potential matching results for use in JFRS. In the meantime, JFRS processes the suspect probe image against previously known criminal photos using its two internal search algorithms.

5 As a result, JFRS now leverages three unique facial recognition search algorithms. More importantly, investigators now have more than 10 times the potential images to compare against when investigating crimes. The integration solution had minimal impact to existing JFRS users. By using web services, JNET was able to integrate results from PennDOT directly into the JFRS interface. There was no need for users to learn a new system and trained investigators were simply provided a third set of image results to view. Training documentation was updated to reflect the new PennDOT results and was made available to the existing JFRS users. The integration of the two systems was so seamless that JNET has not received a single support call for the new interface. The entire project took less than six months to conceptualize, design and implement. The core project team included subject matter experts and quality assurance staff from JNET, development staff from each of the facial recognition providers and project management from PennDOT. Policy, application support, and management representatives from both PennDOT and JNET participated as needed. PennDOT images were made available to JFRS users on December 18, This project cost the commonwealth $75,000 to develop, test and implement, and was made available at no cost to JNET s user community. 4. Significance This project benefits law enforcement by providing a single facial recognition solution that uses three distinct search algorithms to query against two very large repositories that collectively contain nearly 40 million images. With JFRS available through JNET, this enterprise solution is available at no cost to any municipal, county, state or federal law enforcement agency in the commonwealth. Pennsylvania is not aware of any other facial recognition platform in the United States that uses this technology set, or one that is available to such a large and diverse group of users. The use of web services to bridge the gap between PennDOT and JFRS allowed both agencies to maintain the ownership and control of their data while meeting federal and state policies designed to protect the privacy and security of the public.

6 Developing consensus and buy-in from stakeholders to complete this effort was relatively easy. The project clearly aligned with several administration and JNET goals: Develop and maintain strategic partnerships. Facilitate efficient government operations. Provide a contemporary gateway for the delivery of public safety and criminal justice data among municipal, county, state, and federal consumers. Provide extraordinary customer service to the public, agency business partners and stakeholders, and the user community. Finally, any effort that increases the effectiveness and abilities of criminal investigators has a direct positive impact on public safety. Furthermore, improved public safety is a benefit that can be enjoyed and appreciated by all members of the public. 5. Benefits of the Project The most immediate benefit of this project is in the area of public safety. With a minimal investment by the commonwealth, criminal investigators from any jurisdiction in Pennsylvania now have access to 10 times as many potential matches as they did before this project was implemented. Feedback from users of the system has been unanimously positive with over 400 new users trained to access the system in 2013 alone. The value of adding an additional search algorithm with millions of records with no need for new training or additional costs cannot be overstated. Recently, users have reported using the JFRS application on mobile devices to identify unknown individuals during traffic stops; a direct benefit of providing drivers license photographs through JFRS. The project is an example of government at its best: implementing solutions using industry standards and best practices for the benefit of all citizens: Strong governance allowed the agencies the authority to pursue a solution without delay or unnecessary roadblocks. Use of the JNET Private Key Infrastructure (PKI) and role-based identity management solution ensured that data and services were accessed and shared securely. As an enterprise-wide shared service, the PennDOT integration into JFRS provides immediate, no-cost benefits to users.

7 In addition, through the adoption of interoperable and standards-based service development practices such as Global Reference Architecture (GRA) and the National Information Exchange Model (NIEM), the commonwealth has ensured that the services developed for this interface can be reused and shared when the need arises. In summary, Pennsylvania has developed an enterprise solution that merged the functionality and data sets from two disparate facial recognition systems at minimal costs with no impact to users. This dramatically advanced public safety in the commonwealth by augmenting law enforcement s ability to search and identify unknown suspects, regardless of agency size, technology disposition or budget. All of this was accomplished without impacting the integrity, ownership or control of the agency data or applications driving the solution while protecting citizen s privacy.

Executive Summary Overview

Executive Summary Overview Executive Summary Overview Formalized during a Special Session on Crime in 1995, the Commonwealth of Pennsylvania s Justice Network (JNET) is a secure virtual system for the sharing of public safety and

More information

Office of Justice Programs (OJP), Bureau of Justice Assistance (BJA) National Governors Association Center for Best Practices (NGAC)

Office of Justice Programs (OJP), Bureau of Justice Assistance (BJA) National Governors Association Center for Best Practices (NGAC) This document contains a description of each project and a status update as of January 2003. ARIZONA Award To: Arizona Criminal Justice Commission Amount: $230,000 Website: www.acjc.state.az.us The Arizona

More information

Justice Systems Integration: A Definition

Justice Systems Integration: A Definition Justice Systems Integration: A Definition by Steve Prisoc Abstract This paper examines various types of justice systems integration implementations and provides a working definition of integration. It

More information

Introduction DEFINITIONS

Introduction DEFINITIONS Pennsylvania Commission on Crime and Delinquency Guidelines and Technology Standards for the Collection and Transmission of Booking Center Captured Offenders' Identification Information Table of Contents

More information

The following states were recommended and awarded grants:

The following states were recommended and awarded grants: The following states were recommended and awarded grants: ARIZONA Arizona Criminal Justice Commission Amount: $230,000 The Arizona Criminal Justice Commission will use the funds for three projects: Juvenile

More information

Data Integration Initiative Semi Annual Report April 2009. State of North Carolina Office of the State Controller

Data Integration Initiative Semi Annual Report April 2009. State of North Carolina Office of the State Controller Data Integration Initiative Semi Annual Report April 2009 State of North Carolina Office of the State Controller David McCoy, State Controller April 1, 2009 Table of Contents I. Background... 1 II. BEACON

More information

Proposal: Illinois Justice Network Portal

Proposal: Illinois Justice Network Portal Proposal: Illinois Justice Network Portal Summary This proposal addresses the strategic issues that have been identified as being crucial to criminal justice information sharing and recommends the establishment

More information

The Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations. State of Maryland.

The Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations. State of Maryland. The Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations State of Maryland June 1, 2011 1 Section B. The Criminal Justice Dashboard (Dashboard) is

More information

Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management. Category: Cross Boundary Collaboration

Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management. Category: Cross Boundary Collaboration Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management Category: Cross Boundary Collaboration Initiation date: August 2011 Completion date: October 2013 Nomination submitted

More information

Probation Officer's Dashboard

Probation Officer's Dashboard State of North Carolina Department of Correction Probation Officer's Dashboard 2009 NASCIO Recognition Award Nomination Category: Digital Government: Government to Government (G to G) Section B: Executive

More information

INFORMATION TECHNOLOGY GOVERNANCE IN PENNSYLVANIA. Executive Summary

INFORMATION TECHNOLOGY GOVERNANCE IN PENNSYLVANIA. Executive Summary INFORMATION TECHNOLOGY GOVERNANCE IN PENNSYLVANIA Executive Summary The Commonwealth of Pennsylvania has launched a comprehensive IT management transformation. This transformation is evolving the IT governance

More information

2011: Section 408 Application Kansas Progress Report

2011: Section 408 Application Kansas Progress Report 2011: Section 408 Application Kansas Progress Report Status of TRCC The state of Kansas TRCC has continued their progress towards improving traffic safety for the motoring public this year. In response

More information

Routing on Empirical Data (RED) Project

Routing on Empirical Data (RED) Project 2011 NASCIO RECOGNITION AWARD NOMINATION Nomination Category: Cross-Boundary Collaboration and Partnerships Routing on Empirical Data (RED) Project California Technology Agency Public Safety Communications

More information

Fusion Center Technology Resources Road Map: Elements of an Enterprise Architecture for State and Major Urban Area Fusion Centers

Fusion Center Technology Resources Road Map: Elements of an Enterprise Architecture for State and Major Urban Area Fusion Centers Fusion Center Technology Resources Road Map: Elements of an Enterprise for State and Major Urban Area Fusion Centers General Overview The function of a fusion center is to provide a collection, analysis,

More information

Crash Data System - A new-generation software product approach and a move to improved national systems

Crash Data System - A new-generation software product approach and a move to improved national systems 4 th IRTAD CONFERENCE 16-17 September, 2009, Seoul, Korea Crash Data System - A new-generation software product approach and a move to improved national systems Dr. Jim Jarvis & Subu Kamal Country: India

More information

Technology Resource Planning

Technology Resource Planning Technology Resource Planning Part 1: Technology Assessment Summary The Department is dedicated to modernizing and expanding its current information technology function. An independent assessment of the

More information

Law Enforcement Justice Information System

Law Enforcement Justice Information System Law Enforcement Justice Information System Mike Spirito LEJIS Steering Committee Chairman Kevin Switala LEJIS Project Manager LEJIS Overview Introduction of the Problem Project Goals/Approach Status Update

More information

SEARCH. The Global Information Sharing Toolkit: Update on Key Information Sharing Standards. Scott Came Mo West Andrew Owen

SEARCH. The Global Information Sharing Toolkit: Update on Key Information Sharing Standards. Scott Came Mo West Andrew Owen SEARCH The Global Information Sharing Toolkit: Update on Key Information Sharing Standards Scott Came Mo West Andrew Owen Overview Global Standards Data Architecture National Information Exchange Model

More information

PA County Integration Project County Commissioners Association of Pennsylvania. The County Justice Hub Solution

PA County Integration Project County Commissioners Association of Pennsylvania. The County Justice Hub Solution PA County Integration Project County Commissioners Association of Pennsylvania Technical Report The County Justice Hub Solution Leveraging technology to improve inter-agency communication, coordination

More information

State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009

State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009 State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN January 2010 December 2012 DECEMBER 31, 2009 Florida Department of State State Library and Archives of Florida 850.245.6750 http://dlis.dos.state.fl.us/recordsmanagers

More information

The Virginia Corrections Information System (VirginiaCORIS)

The Virginia Corrections Information System (VirginiaCORIS) NASCIO The Virginia Corrections Information System (VirginiaCORIS) NASCIO Staff Contact: Eric Sweden, MSIH MBA Program Director, Enterprise Architecture & Governance NASCIO NASCIO represents state chief

More information

How To Integrate A Criminal Justice System

How To Integrate A Criminal Justice System Middleware Solutions for Integrated Justice: Overview and Examples by Steve Prisoc Abstract This paper examines the use of middleware technologies for the purpose of integrating disparate justice information

More information

SB158 A Texas Approach to a Comprehensive Body-Worn Camera Program

SB158 A Texas Approach to a Comprehensive Body-Worn Camera Program SB158 A Texas Approach to a Comprehensive Body-Worn Camera Program National Conference of State Legislators "Eyes on Crime: Police Body-Worn Cameras" August 4, 2015 Presented by Texas State Senator Royce

More information

David L. Woolfenden. Profile. Relevant Experience

David L. Woolfenden. Profile. Relevant Experience David L. Woolfenden Profile Dave has over thirty years of experience in the information technology (IT) industry as a strategic planner, enterprise architect, systems integrator, practice developer, IT

More information

North Carolina Learning Object Repository (NCLOR)

North Carolina Learning Object Repository (NCLOR) NASCIO Recognition Awards Nomination 2009 Cross-Boundary Collaboration and Partnerships Category NORTH CAROLINA COMMUNITY COLLEGE SYSTEM North Carolina Learning Object Repository (NCLOR) Executive Summary

More information

Security Incident Response Process. Category: Information Security and Privacy. The Commonwealth of Pennsylvania

Security Incident Response Process. Category: Information Security and Privacy. The Commonwealth of Pennsylvania Security Incident Response Process Category: Information Security and Privacy The Commonwealth of Pennsylvania Executive Summary The Commonwealth of Pennsylvania is a trusted steward of citizen information.

More information

Project Management Office Charter

Project Management Office Charter Old Dominion University Office of Computing and Communication Services Project Management Office Charter Version: 1.0 Last Update: February 18, 2010 Created By: Anthony Fox, PMP OCCS Project Management

More information

Mobile Highway Construction App. Improving State Operations. Contact: Phil Tomassini, CIO. Pennsylvania Department of Transportation.

Mobile Highway Construction App. Improving State Operations. Contact: Phil Tomassini, CIO. Pennsylvania Department of Transportation. Mobile Highway Construction App Improving State Operations Contact: Phil Tomassini, CIO Pennsylvania Department of Transportation 400 North Street Harrisburg, PA 17105 717-783-2026 ptomassini@pa.gov Project

More information

COMPUTER- LINKED TRANSACTIONAL RECORDS FOR CRIMINAL JUSTICE STATISTICS. Steve E. Kolodney and Paul K. Wormeli Public Systems incorporated

COMPUTER- LINKED TRANSACTIONAL RECORDS FOR CRIMINAL JUSTICE STATISTICS. Steve E. Kolodney and Paul K. Wormeli Public Systems incorporated COMPUTER- LINKED TRANSACTIONAL RECORDS FOR CRIMINAL JUSTICE STATISTICS Steve E. Kolodney and Paul K. Wormeli Public Systems incorporated For years, national and state authorities, commissions and hearings

More information

Strengthening the Criminal Justice in Pennsylvania

Strengthening the Criminal Justice in Pennsylvania Strengthening the Criminal Justice in Pennsylvania Prepared by the PCCD, Office of Victims Services Summary Restitution holds offenders accountable for the financial losses suffered by the victims of their

More information

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology Establishing A Multi-Factor Authentication Solution Report to the Joint Legislative Oversight Committee on Information Technology Keith Werner State Chief Information Officer Department of Information

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive

More information

HP SOA Systinet software

HP SOA Systinet software HP SOA Systinet software Govern the Lifecycle of SOA-based Applications Complete Lifecycle Governance: Accelerate application modernization and gain IT agility through more rapid and consistent SOA adoption

More information

DELAWARE. Jurisdiction Impact Analysis Real ID Act

DELAWARE. Jurisdiction Impact Analysis Real ID Act DELAWARE Jurisdiction Impact Analysis Real ID Act REAL ID ACT Introduce Full Legal Name into Driver Licensing System (in Record, on Document) Modify all inquiry approximately 4 major interfaces, Modify

More information

Mobile Audio/Video Recorder Policy

Mobile Audio/Video Recorder Policy Mobile Audio/Video Recorder Policy 446.1 PURPOSE AND SCOPE The Fort Collins Police Services has equipped selected vehicles and officers with a Mobile Audio/Video Recording (MAV) system and also allows

More information

Parliamentary Security Camera Policy

Parliamentary Security Camera Policy Parliamentary Security Camera Policy Introduction 1) Security cameras are employed in various parts of the Palace of Westminster and its surrounding estate. They are a vital part of the security system

More information

Colorado Integrated Criminal Justice Information System (CICJIS)

Colorado Integrated Criminal Justice Information System (CICJIS) 2011 NASCIO RECOGNITION AWARDS NOMINATION Colorado Integrated Criminal Justice Information System (CICJIS) Award Category Data, Information and Knowledge Management State Colorado 2011 NASCIO Recognition

More information

Project Description. Understanding PKI

Project Description. Understanding PKI Executive Summary Discussion on Public Key Infrastructure (PKI) in Kansas began more than eight years ago. After careful consideration, input from many groups, extensive research and the creation of an

More information

Healthcare, transportation,

Healthcare, transportation, Smart IT Argus456 Dreamstime.com From Data to Decisions: A Value Chain for Big Data H. Gilbert Miller and Peter Mork, Noblis Healthcare, transportation, finance, energy and resource conservation, environmental

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

How To Create A Secure Web Portal For A Prison System

How To Create A Secure Web Portal For A Prison System ALABAMA SECURE SHARING UTILITY FOR RECIDIVISM ELIMINATION (ASSURE) PROJECT OVERVIEW National Forum on Criminal Justice Breckenridge, CO August 12, 2014 Becki Goggins Director, Knowledge Management Alabama

More information

The Top Five EHR Implementation and Integration Imperatives

The Top Five EHR Implementation and Integration Imperatives The Top Five EHR Implementation and Integration Imperatives How to Identify Them and Achieve Success Introduction Since the push to deploy electronic health records (EHRs) began in earnest with passage

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive

More information

Gloucester City Council

Gloucester City Council Gloucester City Council Agenda Item No: COMMITTEE : OVERVIEW & SCRUTINY MANAGEMENT DATE : 30 NOVEMBER 2005 SUBJECT : MAINTENANCE OF AUTOMATIC NUMBER PLATE RECOGNITION CAMERAS WARD : ALL REPORT BY : CABINET

More information

SOA : To Do or Not to Do

SOA : To Do or Not to Do Abstract SOA : To Do or Not to Do Gopala Krishna Behara and K.T.R.B Sarma As business moves from Web services to SOA, adoption and successful implementations of SOA become more evident. The goal of SOA

More information

Centralized Application and Management System. Category: Data, Information and Knowledge Management. Initiation date: June 2011

Centralized Application and Management System. Category: Data, Information and Knowledge Management. Initiation date: June 2011 Centralized Application and Management System Category: Data, Information and Knowledge Management Initiation date: June 2011 Completion date: November 2012 Nomination submitted by: Samuel A. Nixon Jr.

More information

Hawaii Integrated Justice Information Sharing (HIJIS)

Hawaii Integrated Justice Information Sharing (HIJIS) Hawaii Integrated Justice Information Sharing (HIJIS) NGA Center for Best Practices Privacy Policy Academy Denver, Colorado March 18-19, 2010 HIJIS Revisited Web-based User Interface Enterprise query functions

More information

September 2011 Report No. 12-002

September 2011 Report No. 12-002 John Keel, CPA State Auditor An Audit Report on The Criminal Justice Information System at the Department of Public Safety and the Texas Department of Criminal Justice Report No. 12-002 An Audit Report

More information

A Perspective on Emerging Industry SOA Best Practices

A Perspective on Emerging Industry SOA Best Practices Systems Engineering at MITRE SERVICE-ORIENTED ARCHITECTURE SERIES A Perspective on Emerging Industry SOA Best Practices Executive Version Larry Pizette, Salim Semy, Geoffrey Raines & Steve Foote THE BIG

More information

Statewide Electronic Collision and Ticket Online Records (SECTOR)

Statewide Electronic Collision and Ticket Online Records (SECTOR) NASCIO Statewide Electronic Collision and Ticket Online Records (SECTOR) NASCIO Staff Contact: Eric Sweden, MSIH MBA Program Director, Enterprise Architecture & Governance NASCIO NASCIO represents state

More information

Recommendations for the PIA. Process for Enterprise Services Bus. Development

Recommendations for the PIA. Process for Enterprise Services Bus. Development Recommendations for the PIA Process for Enterprise Services Bus Development A Report by the Data Privacy and Integrity Advisory Committee This report reflects the consensus recommendations provided by

More information

Department-wide Systems and Capital Investment Program

Department-wide Systems and Capital Investment Program Department-wide Systems and Capital Investment Program Mission Statement The Department-wide Systems and Capital Investments Program (DSCIP) is authorized to be used by or on behalf of the Treasury Department

More information

Automated User Provisioning

Automated User Provisioning Automated User Provisioning NOMINATING CATEGORY: ENTERPRISE IT MANAGEMENT INITIATIVES NOMINATOR: TONY ENCINIAS, CHIEF TECHNOLOGY OFFICER COMMONWEALTH OF PENNSYLVANIA 1 TECHNOLOGY PARK HARRISBURG, PA 17110

More information

Associated Industries of Florida. Getting Smart on Juvenile Crime in Florida: Taking It to The Next Level

Associated Industries of Florida. Getting Smart on Juvenile Crime in Florida: Taking It to The Next Level Associated Industries of Florida Getting Smart on Juvenile Crime in Florida: Taking It to The Next Level Reducing Juvenile Arrests by 40% Barney T. Bishop III Chairman Wansley Walters, Director Miami-Dade

More information

Continuing the MDM journey

Continuing the MDM journey IBM Software White paper Information Management Continuing the MDM journey Extending from a virtual style to a physical style for master data management 2 Continuing the MDM journey Organizations implement

More information

HR Service Center James A. Honchar, SPHR

HR Service Center James A. Honchar, SPHR HR Service Center James A. Honchar, SPHR Deputy Secretary for Human Resource Management Office of Administration 517 Finance Building Harrisburg, PA 17120 717.787.8191 717.783.4429 (fax) jhonchar@state.pa.us

More information

Commonwealth of Virginia

Commonwealth of Virginia June 2, 2010 Commonwealth of Virginia Virginia Laboratory Information Management System (LIMS) Category Government to Government Nomination Submitted by Samuel A. Nixon Jr. Chief Information Officer Commonwealth

More information

California Information Technology Strategic Plan

California Information Technology Strategic Plan California Information Technology Strategic Plan 2013 Update Edmund G. Brown Jr. Governor Carlos Ramos Secretary of Technology Focusing on Outcomes Table of Contents Message from the Secretary of California

More information

Long Term Evolution (LTE) for Public Safety

Long Term Evolution (LTE) for Public Safety S T R A T E G I C W H I T E P A P E R Long Term Evolution (LTE) for Public Safety Enabling Flexible Business Models To provide seamless data communication during emergencies, public safety practitioners

More information

Alarm Management: Determining the Best Approach for Your Community

Alarm Management: Determining the Best Approach for Your Community Alarm Management: Determining the Best Approach for Your Community October 2013 Summary Since 2002 the International Association of Chiefs of Police (IACP) and the alarm industry have worked together to

More information

OFFICE OF CHILD DEVELOPMENT(OCD), CCMIS (CHILD CARE MANAGEMENT INFORMATION SYSTEM) 2005 COMPUTERWORLD HONORS CASE STUDY SUMMARY APPLICATION

OFFICE OF CHILD DEVELOPMENT(OCD), CCMIS (CHILD CARE MANAGEMENT INFORMATION SYSTEM) 2005 COMPUTERWORLD HONORS CASE STUDY SUMMARY APPLICATION SUMMARY OFFICE OF CHILD DEVELOPMENT(OCD), CCMIS (CHILD CARE MANAGEMENT INFORMATION SYSTEM) 2005 COMPUTERWORLD HONORS CASE STUDY GOVERNMENT & NON-PROFIT ORGANIZATIONS A SCALABLE COMPREHENSIVE SOLUTION FOR

More information

Roadmap for Integrated Justice: A Guide for Planning and Management

Roadmap for Integrated Justice: A Guide for Planning and Management Roadmap for Integrated Justice: A Guide for Planning and Management By Lawrence P. Webster March 2004 This report was prepared by SEARCH, The National Consortium for Justice Information and Statistics,

More information

NHSIA Overview. National Human Services Interoperability Architecture (NHSIA) May 2012

NHSIA Overview. National Human Services Interoperability Architecture (NHSIA) May 2012 National Human Services Interoperability Architecture (NHSIA) NHSIA Webinar Series Overview Key Concepts Capability & Business Viewpoints Information Viewpoint Systems & Infrastructure Viewpoints and Wrap-

More information

Safety Data Collection, Analysis, and Sharing

Safety Data Collection, Analysis, and Sharing Safety Data Collection, Analysis, and Sharing About the HSIP Noteworthy Practice Series The Highway Safety Improvement Program (HSIP) is a core Federal-aid highway program with the primary purpose of achieving

More information

Town of Greenwich. Strategic Technology Plan

Town of Greenwich. Strategic Technology Plan Town of Greenwich Strategic Technology Plan Executive Summary May 6, 2013 Prepared for: Town of Greenwich 101 Field Point Road Greenwich, CT 06830 PaSFge ihttp:// http://www.berrydunn.com/gcg Acknowledgements

More information

PA Department of Transportation Hazardous Materials Endorsement General Information

PA Department of Transportation Hazardous Materials Endorsement General Information March 2016 PA Department of Transportation Hazardous Materials Endorsement General Information 1. Why conduct FBI background checks for CDL holders who are renewing or obtaining a hazardous materials endorsement?

More information

Prioritization/ political will

Prioritization/ political will Implementation of the United Nations Principles and Guidelines on Access to Legal Aid in Criminal Justice Systems: Follow-up on the Johannesburg Declaration Co-hosted by the Government of South Africa,

More information

TURNING THE SHIP DIGITAL GOVERNMENT

TURNING THE SHIP DIGITAL GOVERNMENT TURNING THE SHIP DIGITAL GOVERNMENT 2015 Software AG. All rights reserved. For internal use only FORCES PUSHING GOVERNMENT CITIZEN EXPECTATION 2 2015 Software AG. All rights reserved. For internal use

More information

5. MEDICAL AND CRIMINAL JUSTICE SYSTEM

5. MEDICAL AND CRIMINAL JUSTICE SYSTEM 5. MEDICAL AND CRIMINAL JUSTICE SYSTEM The Medical and Criminal Justice System section is for recording information about each client s experiences with those systems. This information is optional and

More information

2008 NASCIO Recognition Awards Nomination Commonwealth of Virginia

2008 NASCIO Recognition Awards Nomination Commonwealth of Virginia 2008 NASCIO Recognition Awards Nomination Commonwealth of Virginia Nomination Category: Data, Information and Knowledge Management Title of Nomination: Commonwealth of Virginia Knowledge Center (COVKC)

More information

Enterprise IT Portfolio Governance and Management Model

Enterprise IT Portfolio Governance and Management Model STATE OF MICHIGAN Department of Information Technology Enterprise IT Portfolio Governance and Management Model NASCIO 2007 RECOGNITION AWARDS CATEGORY: IT PROJECT AND PORTFOLIO MANAGEMENT Enterprise IT

More information

Adopting Service Oriented Architecture increases the flexibility of your enterprise

Adopting Service Oriented Architecture increases the flexibility of your enterprise Adopting Service Oriented Architecture increases the flexibility of your enterprise Shireesh Jayashetty, Pradeep Kumar M Introduction Information Technology (IT) systems lasted longer earlier. Organization

More information

Megan s Law. A Guide for Community Organizations, Schools & Daycare Centers

Megan s Law. A Guide for Community Organizations, Schools & Daycare Centers Megan s Law A Guide for Community Organizations, Schools & Daycare Centers Issued as a public service by the N.J. Office of the Attorney General, Division of Criminal Justice in conjunction with the 21

More information

3M Cogent, Inc. White Paper. Facial Recognition. Biometric Technology. a 3M Company

3M Cogent, Inc. White Paper. Facial Recognition. Biometric Technology. a 3M Company 3M Cogent, Inc. White Paper Facial Recognition Biometric Technology a 3M Company Automated Facial Recognition: Turning Promise Into Reality Once the province of fiction, automated facial recognition has

More information

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0 NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5

More information

The Massachusetts Strategic Plan for Cyber Crime

The Massachusetts Strategic Plan for Cyber Crime The Massachusetts Strategic Plan for Cyber Crime FALL 2007 Commonwealth of Massachusetts OFFICE OF ATTORNEY GENERAL MARTHA COAKLEY Introduction Introduction The (AGO) takes a broad view of cyber crime,

More information

MiCJIN. Software Systems and Services Available. Michigan Criminal Justice Information Network

MiCJIN. Software Systems and Services Available. Michigan Criminal Justice Information Network Michigan State Police Criminal Justice Information Center (517) 336-6574 June 2006 Software Systems and Services Available The sharing of information in a highly secure environment has become increasingly

More information

TESTIMONY BY CABELL C. CROPPER MAY 22, 2003

TESTIMONY BY CABELL C. CROPPER MAY 22, 2003 PRESIDENT James Kane Executive Delaware Criminal Justice Council VICE PRESIDENT Raymond T. Slaughter Division of Criminal Justice Colorado Department of Public Safety IMMEDIATE PAST PRESIDENT Mark C. Thompson

More information

Trends. AAMVA 2012 International Conference August 21, 2012

Trends. AAMVA 2012 International Conference August 21, 2012 State eid Priorities, Issues and Trends AAMVA 2012 International Conference August 21, 2012 Chad Grant, Senior Policy Analyst National Association of State Chief Information Officers About NASCIO National

More information

The Digital Identity Ecosystem of the States: Securing the Enterprise

The Digital Identity Ecosystem of the States: Securing the Enterprise The Digital Identity Ecosystem of the States: Securing the Enterprise Security Industry Alliance September 28, 2011 Doug Robinson, Executive Director National Association of State Chief Information Officers

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, November-December 2008 What s Your Information Agenda? Mahesh H. Dodani,

More information

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic

More information

PeopleSoft Enterprise Learning Management

PeopleSoft Enterprise Learning Management PeopleSoft Enterprise Learning Management Christopher Chastain Zanett PeopleSoft Enterprise Learning Management (ELM) takes the delivery and management of training to the next level. Offering a wide variety

More information

Criminal Justice Institute 2013 August 27, 2013. Gary Kalstabakken Product Manager: BCA-MNJIS

Criminal Justice Institute 2013 August 27, 2013. Gary Kalstabakken Product Manager: BCA-MNJIS Criminal Justice Institute 2013 August 27, 2013 Gary Kalstabakken Product Manager: BCA-MNJIS BCA Products Overview What information is available? Who Gets What Information? How Do You Get It? Product Specifics

More information

Setting the Standard for Safe City Projects in the United States

Setting the Standard for Safe City Projects in the United States Leading Safe Cities Setting the Standard for Safe City Projects in the United States Edge360 is a provider of Safe City solutions to State & Local governments, helping our clients ensure they have a secure,

More information

Colorado Integrated Criminal Justice Information System (CICJIS) Program CHARTER and BYLAWS

Colorado Integrated Criminal Justice Information System (CICJIS) Program CHARTER and BYLAWS Colorado Integrated Criminal Justice Information System (CICJIS) Program CHARTER and BYLAWS Program Description The Colorado Integrated Criminal Justice Information System (CICJIS) Program is a complex

More information

White Paper. Web Services External (WS-X) An AS4 Implementation at Cisco

White Paper. Web Services External (WS-X) An AS4 Implementation at Cisco White Paper Web Services External (WS-X) An AS4 Implementation at Cisco Web Services External (WS-X), An AS4 Implementation at Cisco 1 Introduction Modern economy compels business organizations to optimize

More information

The State Projects. GAH:Revised 12/19/03

The State Projects. GAH:Revised 12/19/03 THE OFFICE OF JUSTICE PROGRAMS, BUREAU OF JUSTICE ASSISTANCE /NATIONAL GOVERNORS ASSOCIATION, CENTER FOR BEST PRACTICES JUSTICE INFORMATION TECHNOLOGY INTEGRATION IMPLEMENTATION PROJECT The State Projects

More information

What You Need to Know About Transitioning to SOA

What You Need to Know About Transitioning to SOA What You Need to Know About Transitioning to SOA written by: David A. Kelly, ebizq Analyst What You Need to Know About Transitioning to SOA Organizations are increasingly turning to service-oriented architectures

More information

ANNEX ENLETS. Work programme 2014-2020. European Network of Law Enforcement Technology Services 2013-11-10. 17365/13 EB/hm 2 ANNEX DG D 2C LIMITE EN

ANNEX ENLETS. Work programme 2014-2020. European Network of Law Enforcement Technology Services 2013-11-10. 17365/13 EB/hm 2 ANNEX DG D 2C LIMITE EN Delegations will find attached the work programme of the European Network of Law Enforcement Technology Services (ENLETS) 2014-2020. COSI is invited to endorse this work programme. 17365/13 EB/hm DG D

More information

Alberta Innovates Health Solutions Secondary Use Data Project

Alberta Innovates Health Solutions Secondary Use Data Project Alberta Innovates Health Solutions Secondary Use Data Project I. Executive Summary from the Steering Committee Date: October 30, 2015 Version: 1.1 FINAL Table of Contents Table of Contents... 2 I. Document

More information

TITLE: Massachusetts Executive Office of Health and Human Services Virtual Gateway

TITLE: Massachusetts Executive Office of Health and Human Services Virtual Gateway A. Cover Page TITLE: Massachusetts Executive Office of Health and Human Services Virtual Gateway CATEGORY: Cross-Boundary Collaboration and Partnerships STATE: Massachusetts B. Executive Summary The Virtual

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

WASHINGTON ASSOCIATION OF SHERIFFS AND POLICE CHIEFS Model Policy on Identity Theft Policy, Procedures, and Victim Referral Information

WASHINGTON ASSOCIATION OF SHERIFFS AND POLICE CHIEFS Model Policy on Identity Theft Policy, Procedures, and Victim Referral Information WASHINGTON ASSOCIATION OF SHERIFFS AND POLICE CHIEFS Model Policy on Identity Theft Policy, Procedures, and Victim Referral Information Definition - Identity theft is the wrongful appropriation of an individual

More information

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff The Challenge IT Executives are challenged with issues around data, compliancy, regulation and making confident decisions on their business

More information

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR OPTIMIZING BUSINESS PROCESS MANAGEMENT IN GOVERNMENT

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR OPTIMIZING BUSINESS PROCESS MANAGEMENT IN GOVERNMENT WHITE PAPER: STRATEGIC IMPACT PILLARS FOR OPTIMIZING BUSINESS PROCESS MANAGEMENT IN GOVERNMENT IntelliDyne, LLC MARCH 2012 Strategic Impact Pillars for Optimizing Business Process Management in Government

More information

Information Technology Policy

Information Technology Policy Information Technology Policy Identity Protection and Access Management (IPAM) Architectural Standard Identity Management Services ITP Number ITP-SEC013 Category Recommended Policy Contact RA-ITCentral@pa.gov

More information

Hempfield Township Board of Supervisors

Hempfield Township Board of Supervisors Hempfield Township Board of Supervisors 05/05/2015 MASSAGE THERAPIST APPLICATION Attach the following items at the time of application and renewal. Incomplete applications will not be processed or accepted.

More information

The Commonwealth of Massachusetts AUDITOR OF THE COMMONWEALTH

The Commonwealth of Massachusetts AUDITOR OF THE COMMONWEALTH The Commonwealth of Massachusetts AUDITOR OF THE COMMONWEALTH ONE ASHBURTON PLACE, ROOM 1819 BOSTON, MASSACHUSETTS 02108 A. JOSEPH DeNUCCI AUDITOR TEL. (617) 727-6200 NO. 2008-1262-3S INDEPENDENT STATE

More information

Application Overhaul. Key Initiative Overview

Application Overhaul. Key Initiative Overview Scott D. Nelson Research Managing Vice President This overview provides a high-level description of the Application Overhaul Key Initiative. IT leaders can use this guide to understand how to develop an

More information