Predictive Policing- The Future of Law Enforcement in the Trinidad and Tobago Police Service

Size: px
Start display at page:

Download "Predictive Policing- The Future of Law Enforcement in the Trinidad and Tobago Police Service"

Transcription

1 Predictive Plicing- The Future f Law Enfrcement in the Trinidad and Tbag Plice Service Andre Nrtn T & T Plice Service Crner Edward & Sackville Streets POS, Trinidad WI ABSTRACT The Trinidad and Tbag Plice Service (TTPS) is currently faced with large vlumes f criminal data that cntinues t grw daily and which are required t be prcessed and transfrmed int useful infrmatin and where data mining can greatly imprve crime analysis and aid in preventing and reducing crime. Currently, crime analysts attached t the analytical department f the TTPS are required t unravel the cmplexities in data t assist peratinal persnnel in arresting ffenders and als in directing crime preventin strategies. With the current vlume f crime being cmmitted and the awareness f mdern criminals, this is becming a very daunting task. The ability t analyze huge vlumes f data with its inherent cmplexities withut the use f cmputatinal supprt puts a strain n human resurces. Because f the speed and advances in the field f data mining within recent years, independent studies n its impact n plicing are nly nw getting n the way. It is particularly imprtant in this respect t examine the benefits which the TTPS can derive thrugh a careful implementatin f this technlgy. The infamus events f July, 1990 in Trinidad and Tbag heralded the need fr predictive plicing and exacerbated cncerns abut natinal security by the lcal law enfrcement agency. Accurately and efficiently analyzing the rganizatin s ever grwing vlume f crime data is a majr challenge facing the TTPS. This paper presents a case fr implementing data mining (knwledge discvery in databases -KDD) within the TTPS as a tl fr predictive analytics f crime data. It is hped that this technlgy will prvide decisin makers with intelligence frm the crime data t infrm their strategic planning. It discusses the challenges f implementing data mining with special discussin f key issues relating t data integrity and the infrmatin technlgy (IT) infrastructure required t supprt data mining. It cncludes by suggesting the internal infrmatin technlgy (IT) infrastructural changes needed t facilitate its implementatin in the TTPS. General Terms Crime analysis, technlgical capabilities, law enfrcement, fraud patterns, mney laundering. Keywrds Predictive plicing, Data Mining, Artificial Intelligence, Unifrm Crime Recrding System (UCR) 1. INTRODUCTION In Trinidad and Tbag, cncerns abut natinal security have increased significantly since the lcally attempted terrrist acts f July 27 th Mst agencies charged with the respnsibility fr intelligence gathering have been actively cllecting dmestic intelligence t prevent any future attempts at insurrectin. These effrts have significantly mtivated the primary lcal law enfrcement agency (the Trinidad and Tbag Plice Service TTPS) t mre clsely mnitr criminal activities in all f its jurisdictins. Despite having adpted a cmputerized recrds management system and gegraphic infrmatin systems, the rganizatin s ability t rganize and assemble data abut crime and disrder have nt sared. In sme aspects ur technlgical capabilities have grwn faster than ur capacity t understand. The rganizatin s ability t accurately and efficiently analyze the grwing vlumes f crime data pses a great challenge. Trinidad and Tbag is a twin-island republic with an estimated ppulatin size f 1.3 millin peple [1] with a plice agency (TTPS) cmprising apprximately 6,400 members [2]. In spite f in-huse crime analysts, the rganizatin is yet t explre data mining as a viable ptin fr acquiring predictive capabilities frm its vast strage f crime data. Research has shwn that data mining can greatly imprve crime analysis and aid in reducing and preventing crime. As a matter f fact, n field is in greater need f data mining technlgy than law enfrcement. One ptential area f applicatin is spatial data mining tls which prvides law enfrcement agencies with significant capabilities t learn crime trends n where, hw and why crimes are cmmitted. An early applicatin f data mining in law enfrcement was by the FBI in the investigatin f the Oklahma City bmbing case [3]. They adpted data mining techniques t scrutinize large vlume f data gathered frm varius surces t track dwn criminals. Similarly, the Treasury Department f the United States adpted data mining technlgy t extract suspicius mney laundering r fraud patterns [4]. This is particularly aiming at detecting criminals invlved in mney laundering r fraud. The safety and security f citizens remains a majr cncern fr the TTPS, hwever rather than fcusing n enfrcement and incarceratin, the rganizatin can deter crime thrugh the knwledge benefits that derive frm infrmatin and its assciated technlgies. By emplying the crrect technlgies the rganizatin can turn its fficers int effective prblem slvers by leveraging their intellectual capital t pre-empt crime. One such technlgy is data mining. 2. KEY DEFINITIONS 2.1 What is Predictive Plicing Predictive plicing is a cncept that is built n the premise that it is pssible t predict when and where crimes will ccur 32

2 again in the future by using sphisticated cmputer analysis f infrmatin abut previusly cmmitted crimes [5]. 2.2 What is Data Mining? In its simplest definitin, data mining is the prcess f extracting patterns frm data. It is the prcess f discvering interesting knwledge frm large amunts f data stred either in databases, data warehuses r ther infrmatin repsitries. Crime data mining can be sub-divided int the fllwing techniques: Clustering Classificatin Deviatin Detectin Scial Netwrk Analysis Entity Extractin Assciatin Rule Mining String Cmparatr Sequential Pattern Mining A single data mining tl r technique is nt equally applicable t all the abve-mentined tasks. Based n the nature f the prblem under cnsideratin, and its prximity t the main divisins f the data mining techniques, chice f the apprpriate technique is essential [6]. 3. CRIME RECORDING PROCESS In the Trinidad and Tbag Plice Service crime statistics is cmpiled using the Federal Bureau f Investigatins (FBI) Unifrm Recrding System (UCR). UCR s successr, the Natinal Incident Based Recrding System (NIBRS) is yet t be implemented lcally. There exist varius specialist sectins which investigate different crime types. Fr example all fraud matters are investigated by a specialized fraud unit; likewise stlen vehicles have a specialized investigative unit. The ubiquitus nature f cmputing and the Internet s pervasiveness likewise makes ffences such as identity theft, netwrk intrusin, cyber piracy, and ther illicit cmputermediated activities a new challenge fr the TTPS. Crime reprts are dcumented n rganizatinal specific general ccurrence incident reprt (GOIR) frms which cnsists f structured fields (tick bxes) as well as an unstructured free frm text area. Sme f the key variables fund n GOIR frms are day, date and time f crime (tempral dimensins), lcatin f crime (spatial dimensins), ffence type, victim and suspect data as well as mdus perandi (MO) which identifies hw the crime was cmmitted. MO is dcumented in the unstructured free frm text area f the crime frm. There are apprximately 400 unifrm UCR cdes. The cntents f each frm are manually entered int a centralized recrds management system (RMS) by data entry clerks. 4. CHALLENGES TO DATA MINING IN TTPS At present, the greatest impediment t implementing data mining as a predictive plicing tl within the TTPS is because f the fllwing reasns: A large percentage f the data in the database is incmplete and invalid The data cntain fields that requires parsing (elementizing) by being split int smaller parts befre being able t use data mining tls n the database The data cntain several abbreviatins which shuld be changed t ensure cnsistency thrughut the database (data standardizatin is needed) A significant prtin f the data is incrrect There exists redundancy in the data (duplicate data stred at different lcatins in the database) The database have huge amunts f free frm text that needs t be indexed and classified t be useful fr data mining The data des nt suitably enugh match the business rules f the rganizatin and there exist missing values, incnsistent values and invalid relatinships There are several different frms f data that need t be cnverted t a single frm f cnsistency in the database In additin t these shrtcmings, the database which supplies the raw data is dynamic (subject t update, append, delete etc.), which by default pses prblems. Other unique prblems arise as a cnsequence f these inadequacies and irrelevance f sme f the stred infrmatin. This existing database like mst databases was nt designed t supprt data mining and as such, thse essential attributes fr knwledge discvery f the applicatin dmain are absent frm the data, making it very difficult t discver significant knwledge abut the given dmain. The quality f the data set is dependent upn a number f issues, but the surce f the data is the crucial factr. Data entry and acquisitin is inherently prne t errrs bth simple and cmplex. Much effrt can be given t this frnt-end prcess, with respect t reductin in entry errr, but the fact ften remains that errrs in a large data set are cmmn [7]. Unless the rganizatin takes extreme measures in an effrt t avid data errrs the field errrs rates will typically cntinue. The current system fr cleaning the data is mre f a manual prcess which is labrius, time cnsuming and itself prne t errrs. Analyzing pr quality data prduces very little intelligence fr the rganizatin when designing its peratinal strategies fr manpwer deplyment. One lgical slutin fr imprving data integrity is by incrprating it as part f the rganizatin s business practices thereby reducing the need t cnsistently clean nisy data [8]. Hwever, this pre-prcessing f data as a rutine task usually cnsumes much f the effrts exerted in the entire data mining prcess. Therefre the ptential t increase the usefulness f data by cmbining it with ther data surces is great, but if the underlying data is nt accurate, any relatinships fund in the data may be misleading. A significant amunt f disparately held databases exist amng individual departments which require cnslidatin. Only the peratinal capabilities f gegraphical infrmatin systems (GIS) are being utilized. Hwever where the administrative and strategic capabilities f the sftware is in greatest demand, the necessary skill set required fr such utilizatin is in shrtage acrss the wider rganizatin. 5. DATA MINING TECHNIQUES FOR CRIME PREDICTION Newer data mining techniques when applied t law enfrcement identifies patterns frm bth structured and unstructured data. Similar t ther frms f data mining that exist in the fr prfit wrld, there are privacy issues 33

3 assciated with crime data mining. Hwever researchers and develpers have created several autmated data mining techniques specifically suited t plice agencies [9]. The fllwing are cmmn crime data mining techniques designed fr law enfrcement: Clustering des nt have a set f pre-defined classes fr assigning items. They grup data int classes with similar characteristics in rder t maximize r minimize intra-class similarity. This culd invlve identifying suspects wh cnduct crimes in similar ways r distinguish amng grups belnging t different gangs. Smetimes a statistic based cncept space algrithm is used which autmatically assciate different bjects e.g. persns, rganizatins and vehicles in crime recrds. Clustering crime incidents has a high cmputatinal intensity but autmates a majr part f crime analysis. Classificatin has been used t identify surces f spamming based upn the sender s structural features and linguistic patterns. Classificatin lks fr cmmn features between crime entities and rganizes them int predefined classes. It is ften used t predict crime trends and reduce the time required t identify crime entities but requires a predefined classificatin scheme. It als requires reasnably cmplete training and testing data because a high degree f missing data wuld limit predictin accuracy. Deviatin detectin is als referred t as utlier detectin, uses specific measures t study data that differs markedly frm the rest f the data. This technique is cmmnly applied t fraud detectin, netwrk intrusin detectin, and ther crime analyses, thugh in sme instances these anmalies may be nrmal and thereby adding a further layer f cmplexity making it difficult t identify utliers. Scial netwrk analysis describes the rles f and interactins amng ndes in a cnceptual netwrk. This technique can be used by investigatrs t build a netwrk that illustrates criminals rles, the flw f intangible and tangible infrmatin and entity assciatins. In spite f this technique enables investigatrs t visualize criminal netwrks, the discvery f the netwrk s true leaders may be undiscverable especially if such leaders are lw prfiled. Entity extractin identifies particular patterns frm data such as text, images, r audi materials. It has been used t autmatically identify persns, addresses, vehicles, and persnal characteristics frm plice narrative reprts. Entity extractin prvides basic infrmatin fr crime analysis, but its perfrmance depends greatly n the availability f extensive amunts f clean input data. Assciatin rule mining discvers frequently ccurring item sets in a database and presents the patterns as rules. This technique has been applied in netwrk intrusin detectin t derive assciatin rules frm users interactin histry. Investigatrs als can apply this technique t netwrk intruders prfiles t help detect ptential future netwrk attacks. String cmparatr techniques perfrm a cmparisn between textual fields in pairs f database recrds and cmpute the similarity between the recrds. These techniques can detect deceptive infrmatin such as name, address, and Identificatin Number in criminal recrds. Investigatrs can use string cmparatrs t analyze textual data, but the techniques ften require intensive cmputatin. Sequential pattern mining is similar t assciatin rule mining and this technique finds frequently ccurring sequences f items ver a set f transactins that ccurred at different times. This apprach identifies intrusin patterns in netwrk intrusin detectin amng time-stamped data. Shwing hidden patterns benefits crime analysis, but t btain meaningful results requires rich and highly structured data. 5.1 Phases f Data Mining Data preparatin phase- In this phase, the main data sets t be used by the data mining peratin are identified and cleansed frm any data impurities (data cleaning). If the data is in a data warehuse it will be already integrated and filtered, if nt then it must be extracted frm the peratinal database and cleaned befre utilizing the data mining tls n the newly cleaned data. The data analysis and classificatin phase- The bjective f this phase is t study the data in rder t identify cmmn data characteristics r patterns. The data mining tls applies specific algrithms t find the fllwing: Data grupings, classificatins, clusters, r sequences. Data dependencies, links, r relatinships. Data patterns, trends, and deviatins. The knwledge acquisitin phase- This phase uses the results f the data analysis and classificatin phase. End user interventin selects the apprpriate mdeling r knwledge acquisitin algrithms. Typically the algrithms used in data mining are based n neural netwrks, decisin trees, rules inductin, genetic algrithms, classificatin and regressin trees, memry-based reasning, r nearest neighbr and data visualizatin. Usually a data mining tl may use multiple algrithms in any cmbinatin t generate a cmputer mdel that reflects the behavir f the target data set. The prgnsis phase- In this phase, the data mining findings are used t predict future behavir and frecast ptential rganizatinal utcmes. Examples f data mining findings can be as fllws: 80% f Burglaries are cmmitted by individuals wh jurneyed t cmmit the 34

4 crime at a lcatin distant frm their hmes. 55% f street Rbberies was cmmitted by persns f mixed descent between the ages f yrs. frm single parent husehlds. 75% f stlen vehicles recvered were intact. The cmplete set f findings can be represented in a decisin tree, a neural netwrk, a frecasting mdel r a visual presentatin interface which is then used t prject future events r results. Fr example the prgnsis phase may prject the likely utcme f a new crime plan rll-ut. By uncvering critical patterns and variables that can be indicatrs f future crime activity, the TTPS can practively recgnize and react t threats t public safety befre they take place [10]. 6. A CASE FOR DATA MINING Data mining is ne f the fastest grwing fields in the cmputer industry. Once a small interest area within cmputer science and statistics, it has quickly expanded int a field f its wn. At present, mst f the decisin making prcess fr peratinal deplyment t crime prne areas is nt supprted by superir tls and techniques which can prvide actinable intelligence frm the stred crime data. Cnsequently, resurce deplyment, crime preventin and investigatin strategies are being pursued mre n the basis f crime incidents rather than crime patterns and trends. This is a clear indicatin that the current apprach tward crime preventin takes mre a reactive than practive apprach. Data Mining will facilitate much mre granularity fr analyzing trends and pattern, which when cmbined with criminlgical theries can ptentially prvide the desired predictive capabilities t the rganizatin. The advanced algrithms used by data mining technlgies can allw the TTPS t better predict lcatins where crimes are likely t ccur and direct apprpriate resurces t thse areas. This effectively stps crimes befre they ccur. Despite the extensive use f the TTPS criminal database (RMS) by the agency s crime analysts t prvide analytical prducts fr decisin making, the absence f an infrmatin technlgy infrastructure which supprts analytical prcessing has thus far shrt-changed the rganizatin in realizing its predictive plicing capability (a practive plicing methdlgy) which is much need. Currently, much emphasis is placed n cunting crime and incidents. The crime predictin capabilities achievable frm data mining presents the rganizatin with pprtunities t mve frm merely cunting crimes mre tward anticipating, preventing and perhaps respnding mre effectively t their ccurrence. This fcuses the rganizatin mre n effective use f its stred data t develp deplyment strategies because criminal behavir tends t be relatively predictable which can be determined thrugh analyzing histrical data. Greater predictive capability is achievable utilizing data mining tls t explit existing data sets in rder t prvide mre actinable intelligence frm the stred crime data. 7. CONCLUSION Predictive plicing is slwing making way t the frefrnt f strategic law enfrcement and many plicing experts believe that it may be a prminent directin in the future. It invlves anticipating questins which leads t a search fr evidence, evidence helps fficers establish facts and facts in turn supprt and substantiate actin [11]. Many experts believe that predictive plicing is the future f law enfrcement. Predictive plicing techniques when supprted by the right tls can empwer the TTPS t practively fight crime by facilitating better frecasts f future incidents and events thrugh the fast, accurate detentin f patterns and trends frm its large vlumes f histrical data residing in the RMS [12]. With the advanced predictive mdeling slutins fund in data mining, the rganizatin can have the tls required t be in frnt f crime and stp criminals in their tracks, perate mre cst effectively and bts public trust and cnfidence in the rganizatin [13]. A cmbining f data mining techniques with dashbards, screcards, data visualizatin, interactive mapping, gespatial analysis and enterprise search, the TTPS can vercme budgetary challenges and cmbat crime mre successfully than befre. In rder t achieve the afrementined benefits it is imperative fr the TTPS re-engineer the fllwing: Data Cllectin- There is need t imprve the current data cllectin methdlgy where data integrity becmes built-in t the internal business prcesses f the rganizatin; IT Infrastructure upgrade- TTPS needs t upgrade the infrmatin technlgy infrastructure t facilitate predictive analytics technlgies; Data Structure- All transactinal criminal must be extracted frm its peratinal envirnment, transfrmed int a data structure that facilitates analytical prcessing and stred electrnically in a preferably nn-vlatile strage envirnment (e.g. a data warehuse); Data Integratin- All disparate databases husing criminal and intelligence data must be integrated int this cmmn data structure [14]. Other essential attributes frm Curt and Prcess data, CID/CRO data, prisn release data and GIS data are required t cmplete this cmmn structure. It is imprtant fr plice fficers and crime analysts within TTPS t mve the science frward, making predictins and acting n the results [15]. The gal f the rganizatin shuld always be t reduce crime and imprve service. Implementing data mining technlgies as a predictive plicing tl makes TTPS the pineer ( first mver ) plice agency amng Caricm member states t adpt the technique, thereby setting the stage fr thers t fllw. 8. ACKNOWLEDGMENTS I wuld like t pay special tribute t Dr. Christpher Ward, my supervisr at the University f the West Indies St. 35

5 Augustine Campus Trinidad WI, wh inspired me t write this paper. 9. REFERENCES [1] Central statistical ffice Ministry f Planning and Develpment, Gvernment f the Republic f Trinidad and Tbag. [2] Human Resurce Branch f the Trinidad and Tbag Plice Service (HRB-TTPS) [3] The Federal Bureau f Investigatin, Terrr Hits Hme: The Oklahma City Bmbing [4] Federal Agency Data Mining Reprt 2010, Department f Treasury January [5] Uchida, C Natinal Institute f Justice: A Natinal Discussin n Predictive Plicing: Defining ur Terms and Mapping Successful Implementatin Strategies NJC [6] Adderley, R & P.B. Musgrve Data Mining Case Study: Mdeling the Behavir f Offenders Wh Cmmit Serius Sexual Assaults, Prceedings f the seventh ACM SIGKDD internatinal cnference n Knwledge discvery and data mining. [7] Brwn, D., 2003.The Reginal Crime Analysis Prgram (RECAP): A Framewrk fr Mining Data t Catch Criminals. [8] Butler, A Plice Management 2 nd Editin, England: Dartmuth Publishing Cmpany Limited. [9] Franklin, D Data Miners: New sftware instantly cnnects key bits f data that nce eluded teams f researchers. Time, December 23. [10] Helberg, C Data mining with cnfidence, 2 nd Editin, SPSS, Inc., Chicag, IL. [11] Mena, J Investigative Data Mining fr Security and Criminal Detectin, Elsevier Science (USA). [12] Mc Cue, C. et al, Data Mining and value-added analysis, FBI Law Enfrcement Bulletin, [13] Mc Cue, C Data Mining and Predictive Analysis: Intelligence gathering and Crime Analysis, Butterwrth- Heinemann. [14] Perez, B Data Mining Technlgy Use Grws; pdf [15] Tabussum, Z CIA turns t data mining; rns_t.html 36

Business Intelligence represents a fundamental shift in the purpose, objective and use of information

Business Intelligence represents a fundamental shift in the purpose, objective and use of information Overview f BI and rle f DW in BI Business Intelligence & Why is it ppular? Business Intelligence Steps Business Intelligence Cycle Example Scenaris State f Business Intelligence Business Intelligence Tls

More information

To transform information into knowledge- a firm must expend additional resources to discover, patterns, rules, and context where the knowledge works

To transform information into knowledge- a firm must expend additional resources to discover, patterns, rules, and context where the knowledge works Chapter 15- Managing Knwledge Knwledge Management Landscape Knwledge management systems- supprt the creatin, capture, strage, and disseminatin f firm expertise and knwledge, have becme ne f the fastest-grwing

More information

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

Change Management Process

Change Management Process Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses

More information

Case Study. Sonata develops. comprehensive BI Application for a leading provider of Animal Nutrition Solutions. Ananthakrishnan

Case Study. Sonata develops. comprehensive BI Application for a leading provider of Animal Nutrition Solutions. Ananthakrishnan Case Study Ananthakrishnan Snata develps J Architect, Snata Sftware cmprehensive BI Applicatin fr a leading prvider f Animal Nutritin Slutins Snata Sftware Limited www.snata-sftware.cm www.snata-sftware.cm

More information

Data Warehouse Scope Recommendations

Data Warehouse Scope Recommendations Rensselaer Data Warehuse Prject http://www.rpi.edu/datawarehuse Financial Analysis Scpe and Data Audits This dcument describes the scpe f the Financial Analysis data mart scheduled fr delivery in July

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Getting Started Guide

Getting Started Guide AnswerDash Resurces http://answerdash.cm Cntextual help fr sales and supprt Getting Started Guide AnswerDash is cmmitted t helping yu achieve yur larger business gals. The utlined pre-launch cnsideratins

More information

Case Study Law Firm Profit and Growth LBMS Transforms a Major Law Firm s Market Expansion & Increased Profitability Vision into Reality

Case Study Law Firm Profit and Growth LBMS Transforms a Major Law Firm s Market Expansion & Increased Profitability Vision into Reality Case Study Law Firm Prfit and Grwth LBMS Transfrms a Majr Law Firm s Market Expansin & Increased Prfitability Visin int Reality Cpyright 2011 Elegrity Incrprated. All rights reserved. N part f this dcument

More information

MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016

MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 The Manitba Securities Cmmissin (the Cmmissin) is a divisin f the Manitba Financial Services Agency (MFSA). The ther divisin is the Financial Institutins

More information

IN-HOUSE OR OUTSOURCED BILLING

IN-HOUSE OR OUTSOURCED BILLING IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability

More information

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES REFERENCES AND RELATED POLICIES A. UC PPSM 2 -Definitin f Terms B. UC PPSM 12 -Nndiscriminatin in Emplyment C. UC PPSM 14 -Affirmative

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

The Importance of Market Research

The Importance of Market Research The Imprtance f Market Research 1. What is market research? Successful businesses have extensive knwledge f their custmers and their cmpetitrs. Market research is the prcess f gathering infrmatin which

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

There are a number of themed areas for which the Council has responsibility, and each of these is likely to generate debts of a specific type:

There are a number of themed areas for which the Council has responsibility, and each of these is likely to generate debts of a specific type: Wiltshire Cuncil Crprate Debt Recvery Plicy: 29102010 WILTSHIRE COUNCIL CORPORATE DEBT RECOVERY POLICY 1. Intrductin The Cuncil raises a significant prprtin f its ttal incmes thrugh lcal taxes and charges,

More information

NC3A SOA Techwatch Day Call for Presentations

NC3A SOA Techwatch Day Call for Presentations NC3A SOA Techwatch Day Call fr Presentatins 1 February 2012 Hsted at NATO C3 Agency, The Hague, The Netherlands By NC3A Chief Technlgy Office (CTO) David Burtn Chief Technlgy fficer Versin 1, 1 December

More information

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

BRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitioner Level) Specific Role Data Architect

BRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitioner Level) Specific Role Data Architect BRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitiner Level) Specific Rle Data Architect Grade Directrate Managed by BG13 (TBC) Business Change Senir Infrmatin Systems & Technlgy Architect

More information

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd. Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an

More information

Data Abstraction Best Practices with Cisco Data Virtualization

Data Abstraction Best Practices with Cisco Data Virtualization White Paper Data Abstractin Best Practices with Cisc Data Virtualizatin Executive Summary Enterprises are seeking ways t imprve their verall prfitability, cut csts, and reduce risk by prviding better access

More information

ITIL Release Control & Validation (RCV) Certification Program - 5 Days

ITIL Release Control & Validation (RCV) Certification Program - 5 Days ITIL Release Cntrl & Validatin (RCV) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management

More information

Delaware Performance Appraisal System

Delaware Performance Appraisal System Delaware Perfrmance Appraisal System Building greater skills and knwledge fr educatrs DPAS-II Guide fr Administratrs (District Administratrs) Supervisr Rubric fr Evaluating District Administratrs Updated

More information

How to Reduce Project Lead Times Through Improved Scheduling

How to Reduce Project Lead Times Through Improved Scheduling Hw t Reduce Prject Lead Times Thrugh Imprved Scheduling PROBABILISTIC SCHEDULING & BUFFER MANAGEMENT Cnventinal Prject Scheduling ften results in plans that cannt be executed and t many surprises. In many

More information

Systems Load Testing Appendix

Systems Load Testing Appendix Systems Lad Testing Appendix 1 Overview As usage f the Blackbard Academic Suite grws and its availability requirements increase, many custmers lk t understand the capability f its infrastructure. As part

More information

Phi Kappa Sigma International Fraternity Insurance Billing Methodology

Phi Kappa Sigma International Fraternity Insurance Billing Methodology Phi Kappa Sigma Internatinal Fraternity Insurance Billing Methdlgy The Phi Kappa Sigma Internatinal Fraternity Executive Bard implres each chapter t thrughly review the attached methdlgy and plan nw t

More information

TOWARDS OF AN INFORMATION SERVICE TO EDUCATIONAL LEADERSHIPS: BUSINESS INTELLIGENCE AS ANALYTICAL ENGINE OF SERVICE

TOWARDS OF AN INFORMATION SERVICE TO EDUCATIONAL LEADERSHIPS: BUSINESS INTELLIGENCE AS ANALYTICAL ENGINE OF SERVICE TOWARDS OF AN INFORMATION SERVICE TO EDUCATIONAL LEADERSHIPS: BUSINESS INTELLIGENCE AS ANALYTICAL ENGINE OF SERVICE A N D R E I A F E R R E I R A, A N T Ó N I O C A S T R O, D E L F I N A S Á S O A R E

More information

CDC UNIFIED PROCESS PRACTICES GUIDE

CDC UNIFIED PROCESS PRACTICES GUIDE Dcument Purpse The purpse f this dcument is t prvide guidance n the practice f Risk Management and t describe the practice verview, requirements, best practices, activities, and key terms related t these

More information

Job Profile Data & Reporting Analyst (Grant Fund)

Job Profile Data & Reporting Analyst (Grant Fund) Jb Prfile Data & Reprting Analyst (Grant Fund) Directrate Lcatin Reprts t Hurs Finance Slihull Finance Directr Nminally 37 hurs but peratinally available at all times t meet Cmpany requirements Cntract

More information

ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days

ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days ITIL Service Offerings & Agreement (SOA) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management

More information

Succession Planning & Leadership Development: Your Utility s Bridge to the Future

Succession Planning & Leadership Development: Your Utility s Bridge to the Future Successin Planning & Leadership Develpment: Yur Utility s Bridge t the Future Richard L. Gerstberger, P.E. TAP Resurce Develpment Grup, Inc. 4625 West 32 nd Ave Denver, CO 80212 ABSTRACT A few years ag,

More information

Seattle Police Department

Seattle Police Department Seattle Plice Department Prpsed develpment f a Business Intelligence System December 2013 Versin: FINAL Executive Summary Executive Summary 1. Intrductin The United States and the City f Seattle have entered

More information

HIPAA 5010 Implementation FAQs for Health Care Professionals

HIPAA 5010 Implementation FAQs for Health Care Professionals HIPAA 5010 Implementatin FAQs fr Health Care Prfessinals Updated September 27, 2012 Key Messages In January 2009, the Department f Health and Human Services published the final rule cntaining the requirements

More information

Completing the CMDB Circle: Asset Management with Barcode Scanning

Completing the CMDB Circle: Asset Management with Barcode Scanning Cmpleting the CMDB Circle: Asset Management with Barcde Scanning WHITE PAPER The Value f Barcding Tday, barcdes are n just abut everything manufactured and are used fr asset tracking and identificatin

More information

Vulnerability Management:

Vulnerability Management: Vulnerability Management: Creating a Prcess fr Results Kyle Snavely Veris Grup, LLC Summary Organizatins increasingly rely n vulnerability scanning t identify risks and fllw up with remediatin f thse risks.

More information

Getting Started Guide

Getting Started Guide Getting Started Guide AnswerDash is cmmitted t helping yu achieve yur larger business gals. The utlined pre-launch cnsideratins are key t setting up yur implementatin s yu can make pwerful imprvements

More information

Business Intelligence and DataWarehouse workshop

Business Intelligence and DataWarehouse workshop Business Intelligence and DataWarehuse wrkshp Benefits: Enables the Final year BE student/ Junir IT prfessinals t get a perfect blend f thery and practice n Business Intelligence and Data warehuse s as

More information

FCA US INFORMATION & COMMUNICATION TECHNOLOGY MANAGEMENT

FCA US INFORMATION & COMMUNICATION TECHNOLOGY MANAGEMENT EDI ROADMAP FCA US INFORMATION & COMMUNICATION TECHNOLOGY MANAGEMENT FCA US EDI Radmap Business Requirement All FCA suppliers and carriers are required t establish an Electrnic Data Interchange (EDI) cnnectin.

More information

Accident Investigation

Accident Investigation Accident Investigatin APPLICABLE STANDARD: 1960.29 EMPLOYEES AFFECTED: All emplyees WHAT IS IT? Accident investigatin is the prcess f determining the rt causes f accidents, n-the-jb injuries, prperty damage,

More information

COE: Hybrid Course Request for Proposals. The goals of the College of Education Hybrid Course Funding Program are:

COE: Hybrid Course Request for Proposals. The goals of the College of Education Hybrid Course Funding Program are: COE: Hybrid Curse Request fr Prpsals The gals f the Cllege f Educatin Hybrid Curse Funding Prgram are: T supprt the develpment f effective, high-quality instructin that meets the needs and expectatins

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

Process Improvement Center of Excellence Service Proposal Recommendation. Operational Oversight Committee Report Submission

Process Improvement Center of Excellence Service Proposal Recommendation. Operational Oversight Committee Report Submission Prcess Imprvement Center f Excellence Service Prpsal Recmmendatin Operatinal Oversight Cmmittee Reprt Submissin INTRODUCTION This Prpsal prvides initial infrmatin regarding a pssible additin t a service.

More information

FundingEdge. Guide to Business Cash Advance & Bank Statement Loan Programs

FundingEdge. Guide to Business Cash Advance & Bank Statement Loan Programs Guide t Business Cash Advance & Bank Statement Lan Prgrams Cash Advances: $2,500 - $1,000,000 Business Bank Statement Lans: $5,000 - $500,000 Canada Cash Advances: $5,000 - $500,000 (must have 9 mnths

More information

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013 Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,

More information

Chapter 7 Business Continuity and Risk Management

Chapter 7 Business Continuity and Risk Management Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Team Process Data Warehouse Goals and High-Level Requirements

Team Process Data Warehouse Goals and High-Level Requirements Team Prcess Data Warehuse Gals and High-Level Requirements Backgrund TSP SM is used by teams wrking in a wide variety f prblem dmains (e.g. sftware, hardware, services). Since these activities are nt limited

More information

Organizational Applications and Solutions SCM and ERP

Organizational Applications and Solutions SCM and ERP Dr Sherif Kamel Department f Management Schl f Business, Ecnmics and Cmmunicatin Organizatinal Applicatins and Slutins SCM and ERP Outline Supply chain and value chain definitins Cmpnents, benefits and

More information

Disk Redundancy (RAID)

Disk Redundancy (RAID) A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

Considerations for Success in Workflow Automation. Automating Workflows with KwikTag by ImageTag

Considerations for Success in Workflow Automation. Automating Workflows with KwikTag by ImageTag Autmating Wrkflws with KwikTag by ImageTag Cnsideratins fr Success in Wrkflw Autmatin KwikTag balances cmprehensive, feature-rich Transactinal Cntent Management with affrdability, fast implementatin, ease

More information

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine Title: Identity Theft Prgram Effective Date: July 2009 NYU Langne Medical Center NYU Hspitals Center NYU Schl f Medicine POLICY It is the plicy f the NYU Langne Medical Center t educate and train staff

More information

Mobile Workforce. Improving Productivity, Improving Profitability

Mobile Workforce. Improving Productivity, Improving Profitability Mbile Wrkfrce Imprving Prductivity, Imprving Prfitability White Paper The Business Challenge Between increasing peratinal cst, staff turnver, budget cnstraints and pressure t deliver prducts and services

More information

The Allstate Foundation Domestic Violence Program 2015 Moving Ahead Financial Empowerment Grant

The Allstate Foundation Domestic Violence Program 2015 Moving Ahead Financial Empowerment Grant The Allstate Fundatin Dmestic Vilence Prgram 2015 Mving Ahead Financial Empwerment Grant Due Date: September 1, 2015 Online applicatin: https://www.grantrequest.cm/sid_1010?sa=sna&fid=35296 The Allstate

More information

CMS Eligibility Requirements Checklist for MSSP ACO Participation

CMS Eligibility Requirements Checklist for MSSP ACO Participation ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.

More information

Defining Sales Campaign Automation How e-mail, the Killer App, is best applied to marketing

Defining Sales Campaign Automation How e-mail, the Killer App, is best applied to marketing Defining Sales Campaign Autmatin Hw e-mail, the Killer App, is best applied t marketing Summary: Cmpanies tday are steadily adpting strategies and technlgies t reach prspects, custmers, and partners thrugh

More information

OE PROJECT MANAGEMENT GLOSSARY

OE PROJECT MANAGEMENT GLOSSARY OE PROJECT MANAGEMENT GLOSSARY ACCEPTANCE CRITERIA : thse criteria, including perfrmance requirements and essential cnditins that must be met befre the prject deliverables are accepted. ACTIVITY: an actin

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

What is Software Risk Management? (And why should I care?)

What is Software Risk Management? (And why should I care?) What is Sftware Risk Management? (And why shuld I care?) Peter Kulik, KLCI, Inc. 1 st Editin, Octber 1996 Risks are schedule delays and cst verruns waiting t happen. As industry practices have imprved,

More information

Health and Safety Training and Supervision

Health and Safety Training and Supervision Intrductin: Health and Safety Training and Supervisin University f Nttingham is cmmitted t maintaining and develping standards f excellence in all aspects f its business. T that end, the University aspires

More information

Design for securability Applying engineering principles to the design of security architectures

Design for securability Applying engineering principles to the design of security architectures Design fr securability Applying engineering principles t the design f security architectures Amund Hunstad Phne number: + 46 13 37 81 18 Fax: + 46 13 37 85 50 Email: amund@fi.se Jnas Hallberg Phne number:

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

Clinical Data Collection - Paper vs. Electronic Data Capture (EDC)

Clinical Data Collection - Paper vs. Electronic Data Capture (EDC) Clinical Data Cllectin - Paper vs. Electrnic Data Capture (EDC) Patrick Tuminar C.E.O Sftware Dynamics 20 years ag experts predicted that electrnic case reprt frms (CRFs) wuld replace paper as a natural

More information

2008 BA Insurance Systems Pty Ltd

2008 BA Insurance Systems Pty Ltd 2008 BA Insurance Systems Pty Ltd BAIS have been delivering insurance systems since 1993. Over the last 15 years, technlgy has mved at breakneck speed. BAIS has flurished in this here tday, gne tmrrw sftware

More information

Oakland Unified School District Impact Assessment Performance Management in Action

Oakland Unified School District Impact Assessment Performance Management in Action Oakland Unified Schl District Impact Assessment Perfrmance Management in Actin The perfrmance management system that has been built in this district prvides the systems that supprt ur cmmitment t scial

More information

Analytical Techniques created for the offline world can they yield benefits online?

Analytical Techniques created for the offline world can they yield benefits online? Analytical Techniques created fr the ffline wrld can they yield benefits nline? Dr. Barry Leventhal BarryAnalytics Limited Transfrming Data Abut BarryAnalytics Advanced Analytics Cnsultancy funded in 2009

More information

Usage of data mining for analyzing customer mindset

Usage of data mining for analyzing customer mindset Internatinal Jurnal f Electrnics and Cmputer Science Engineering 2533 Available Online at www.ijecse.rg ISSN- 2277-1956 Usage f data mining fr analyzing custmer mindset Priti Sadaria 1, Miral Kthari 1

More information

Problem Management Practitioners Forum. Thursday March 15, 2012 Jorge A. Wong

Problem Management Practitioners Forum. Thursday March 15, 2012 Jorge A. Wong Prblem Management Practitiners Frum Thursday March 15, 2012 Jrge A. Wng Agenda Husekeeping & Intrductins Impact f Change Management n PbM Attend Change & Release Management meetings t frecast utages Tday

More information

Standardization or Harmonization? You need Both

Standardization or Harmonization? You need Both Standardizatin r? Yu need Bth Albrecht Richen and Ansgar Steinhrst Recently the CFO f a majr cnsumer electrnics cmpany stated, We dn t need standardizatin f ur wrldwide prcesses, we need harmnizatin. Is

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Dec. 2012. Transportation Management System. An Alternative Traffic Solution for the Logistics Professionals

Dec. 2012. Transportation Management System. An Alternative Traffic Solution for the Logistics Professionals Dec. 2012 Transprtatin Management System An Alternative Traffic Slutin fr the Lgistics Prfessinals What is a TMS-Lite system? What are the features and capabilities f a TMS-Lite system? Why chse a TMS-Lite

More information

ATLAS on substance use (2010) Resources for the prevention and treatment of substance use disorders

ATLAS on substance use (2010) Resources for the prevention and treatment of substance use disorders INTRODUCTION Dimensins f psychactive substance use and dependence The use f alchl and ther psychactive substances alters bth the functin and, ultimately, the structure f the brain by the altered stimulatin

More information

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Aim The aim of a communication plan states the overall goal of the communication effort.

Aim The aim of a communication plan states the overall goal of the communication effort. Develping a Cmmunicatin Plan- Aim Aim The aim f a cmmunicatin plan states the verall gal f the cmmunicatin effrt. Determining the Aim Ask yurself r yur team what the verall gal f the cmmunicatin plan is.

More information

Network Security Trends in the Era of Cloud and Mobile Computing

Network Security Trends in the Era of Cloud and Mobile Computing Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager

More information

Privacy Breach and Complaint Protocol

Privacy Breach and Complaint Protocol Privacy Breach and Cmplaint Prtcl Effective: December 31, 2012 Apprved by: Le McKenna, CFO 1.0 General Privacy breaches and privacy cmplaints will be handled in accrdance with this prtcl. This prtcl is

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

Data Mining & Advanced Analytics

Data Mining & Advanced Analytics Data Mining & Advanced Analytics Expandiend el alcance de sus mdels predictivs Marian Urman Sales Engineering Manager 1 Current Situatin 2 Users f Advanced Analytics Data Mining Users BI Users Tw types

More information

Introduction... 2. 1. Identify Projects for Inclusion in HMIS... 3. 2. Identify Funding Components for each Project... 3

Introduction... 2. 1. Identify Projects for Inclusion in HMIS... 3. 2. Identify Funding Components for each Project... 3 Table f Cntents Intrductin... 2 HMIS Prject Setup Steps... 3 1. Identify Prjects fr Inclusin in HMIS... 3 2. Identify Funding Cmpnents fr each Prject... 3 3. Set Up Prjects in HMIS... 4 Data Cllectin Requirements...

More information

Duration of job. Context and environment: (e.g. dept description, region description, organogram)

Duration of job. Context and environment: (e.g. dept description, region description, organogram) Rle Prfile Jb Descriptin Jb Title Ref n: Prgramme Manager, Services fr Internatinal Educatin Marketing Directrate r Regin East Asia Department/Cuntry Indnesia Lcatin f pst Jakarta Pay Band G Reprts t Senir

More information

TO: Chief Executive Officers of all National Banks, Department and Division Heads, and all Examining Personnel

TO: Chief Executive Officers of all National Banks, Department and Division Heads, and all Examining Personnel AL 96-7 Subject: Credit Card Preapprved Slicitatins TO: Chief Executive Officers f all Natinal Banks, Department and Divisin Heads, and all Examining Persnnel PURPOSE The purpse f this advisry letter is

More information

BUSINESS NEED SUMMARY TABLE: # Need P Concerns Current Solution Proposed Solution

BUSINESS NEED SUMMARY TABLE: # Need P Concerns Current Solution Proposed Solution EXTRACT FRO BUSINESS REQUIREENTS DOCUENT KEY BUSINESS NEEDS Business case drivers, prduct definitin dcumentatin, legal/regulatry, and ther stated requirements r needs that must be met by the final slutin

More information

Internal Audit Charter and operating standards

Internal Audit Charter and operating standards Internal Audit Charter and perating standards 2 1 verview This dcument sets ut the basis fr internal audit: (i) the Internal Audit charter, which establishes the framewrk fr Internal Audit; and (ii) hw

More information

HUMAN RESOURCE DEVELOPMENT FOR ADJUSTMENT AT THE ENTERPRISE LEVEL

HUMAN RESOURCE DEVELOPMENT FOR ADJUSTMENT AT THE ENTERPRISE LEVEL INTERNATIONAL LABOUR ORGANISATION ACT/EMP PUBLICATIONS [Tp] HUMAN RESOURCE DEVELOPMENT FOR ADJUSTMENT AT THE ENTERPRISE LEVEL Training Prgramme (Edited by C.S. Venkata Ratnam) [Next] Table f Cntents Intrductin

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

ready. aiim. learn. 2-day BPM Specialist Training Class - Learn global best practices for improving business processes

ready. aiim. learn. 2-day BPM Specialist Training Class - Learn global best practices for improving business processes 2-day BPM Specialist Training Class - Learn glbal best practices fr imprving business prcesses Intrductin The Business Prcess Management (BPM) Certificate Prgram is designed frm glbal best practices amng

More information

Trends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003

Trends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003 Trends and Cnsideratins in Currency Recycle Devices Nvember 2003 This white paper prvides basic backgrund n currency recycle devices as cmpared t the cmbined features f a currency acceptr device and a

More information

LINCOLNSHIRE POLICE Policy Document

LINCOLNSHIRE POLICE Policy Document LINCOLNSHIRE POLICE Plicy Dcument 1. POLICY IDENTIFICATION PAGE POLICY TITLE: ICT CHANGE & RELEASE MANAGEMENT POLICY POLICY REFERENCE NO: PD 186 POLICY OWNERSHIP: ACPO Cmmissining Officer: Prtfli / Business-area

More information

Project Startup Report Presented to the IT Committee June 26, 2012

Project Startup Report Presented to the IT Committee June 26, 2012 Prject Name: SOS File 2.0 Agency: Secretary f State Business Unit/Prgram Area: Secretary f State Prject Spnsr: Al Jaeger Prject Manager: Beverly Maitland Prject Startup Reprt Presented t the IT Cmmittee

More information

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy AHLA C. Big Data, Clud Cmputing and the New Wrld Order fr Health Care Privacy Marti Arvin Chief Cmpliance Officer UCLA David Geffen Schl f Medicine Ls Angeles, CA Kirk J. Nahra Wiley Rein LLP Washingtn,

More information

MEDICAL INFORMATION AND CALL CENTER PERFORMANCE BUILDING NEW PRACTICES TO MEET THE EVOLVING NEEDS OF HCPS AND PATIENTS

MEDICAL INFORMATION AND CALL CENTER PERFORMANCE BUILDING NEW PRACTICES TO MEET THE EVOLVING NEEDS OF HCPS AND PATIENTS MEDICAL INFORMATION AND CALL CENTER PERFORMANCE BUILDING NEW PRACTICES TO MEET THE EVOLVING NEEDS OF HCPS AND PATIENTS THE BOTTOM LINE: In tday s budget-cnstrained envirnment, medical infrmatin teams must

More information

Rensselaer Data Warehouse Project. Financial Analysis Requirements Findings. Last saved on 1/25/02 Page 1

Rensselaer Data Warehouse Project. Financial Analysis Requirements Findings. Last saved on 1/25/02 Page 1 Rensselaer Data Warehuse Prject Financial Analysis Requirements Findings Last saved n 1/25/02 Page 1 OVERVIEW... 3 BACKGROUND... 3 PROCESS AND PARTICIPANTS... 3 Finance... 3 Administratin... 3 Schls...

More information

CDC UNIFIED PROCESS PRACTICES GUIDE

CDC UNIFIED PROCESS PRACTICES GUIDE Dcument Purpse The purpse f this dcument is t prvide guidance n the practice f Business Case and t describe the practice verview, requirements, best practices, activities, and key terms related t these

More information

Solution. Industry. Challenges. Client Case Study. Legacy Systems too Costly to Maintain. Supply Chain Advantage. Delivered.

Solution. Industry. Challenges. Client Case Study. Legacy Systems too Costly to Maintain. Supply Chain Advantage. Delivered. Supply Chain Advantage. Delivered. Client Case Study MEBC Supprts the Federal Aviatin Administratin Manage Prject Risk during Majr ERP Implementatin thrugh Independent Verificatin and Validatin (IV&V)

More information

FHWA Compliance Assessment Program (CAP) Guidance

FHWA Compliance Assessment Program (CAP) Guidance See 2015 updates at http://www.fhwa.dt.gv/federalaid/stewardship/feb2015update.cfm FHWA Cmpliance Assessment Prgram (CAP) Guidance Backgrund ed ed The gal f risk-based prject stewardship and versight is

More information