Introduction to Case Information Database Management System (CIDMS)
|
|
- Ethan Walker
- 6 years ago
- Views:
Transcription
1 Introduction to Case Information Database Management System (CIDMS)
2 Lesson Goals This topic is designed for the participants to learn about CIDMS
3 Objectives After this lesson, the participants will be able to: 1. Define what is CIDMS 2. Explain how CIDMS developed 3. Explain the objectives of CIDMS 4. Enumerate what information we can store in CIDMS 5. Explain why CIDMS/NGIS? 6. Explain the NGIS Concept 7. Explain the differences between CIRAS and CIDMS 8. Explain CIDMS Policies 9. Answer the Frequently Asked Questions about CIDMS
4 What is CIDMS? CIDMS is the CASE MANAGEMENT INFORMATION SYSTEM of the PNP specifically designed for Investigators in managing case files/folders The CIDMS acronym stands for Case Information Database Management System A program initially used by CIDG that was enhanced by DIDM thru the technical assistance of ITMS First It was a LAN/stand-alone, now it is a Web-Based information system using SQL as back-end and visual basic.net/php as front-end Web-based CIDMS domain name is
5 How was CIDMS developed? By gathering inputs from the end-users - Investigators from Police Stations (NCRPO & Regions) Inputs from Investigators/Case Monitoring Personnel from DIDM, CIDG, WCPC, AKG, ACG, AVSEGROUP, MG. Inputs from evidence concerned personnel, subject-matter experts and forensic examiners from HPG-Motor Vehicle Clearance Division, CSG- Firearms and Explosives Office and Crime Laboratory. Inputs from Legal Officer of DIDM (detailed, from Legal Service) Inputs from Information Technology Officers of DICTM and ITMS And also from learning about information systems of other government agencies (like Supreme Court s E-courts) and other countries (like the TIMS of Albania - was presented to the PNP).
6 Objectives of CIDMS CIDMS is a tool for Investigators to; Easily access and manage case files/folders Have a systematic recording by digitizing case files/folders Backup case folders in case we lose the case folder because of flooding, earthquake, fire and so on. Avoid voluminous records Cross-reference various cases
7 Let s review what is Criminal Investigation? Is an applied science that involves the study of facts, used to identify, locate and gather evidence to prove the guilt of the suspect to solve the case. Facts include but not limited to: Incident and Case Information Persons Involved Pieces of Evidence
8 What case Information can we store in CIDMS? Facts about the incident Facts about how the incident was reported Law enforcement officers involved Civilian persons Involved Pieces of Evidence Information on the filing and status of the case in Prosecutor s Office Court(s) of Law Electronic copy of the case files or the entire case folder
9 Why CIDMS/NGIS? Technological advancement Criminals becomes smarter and more organized Crimes becomes more complex and sophisticated Increase of crimes in which Information Technology is used (drug/human trafficking, identity theft, terrorism, cybercrimes, telecommunication fraud etc.) Need for Law Enforcement to adapt to the challenge of modern day policing (fight back) If Information technology is a means to commit a crime, it can also be a means to fight crime.
10 World Wide Web and Cybercrimes The World-Wide Web is easy to access but hard to secure. Conventional web browsers can only access the Surface Web (shallow 20%). The Deep Web (80%) is anything that a search engine can t find. The Dark Web is classified as a small portion of the Deep Web intentionally hidden, inaccessible through standard web browsers. It is being used to propagate illegal activities like selling illegal drugs online, money laundering in the advent of virtual currency (bit coins).
11 World Wide Web and Cybercrimes
12
13 NGIS CONCEPT C O CIRAS (Enhanced e-blotter & GIS) e-warrant N V E R G E N CMAS CIDMS e-roques C E e-subpoena
14 Difference between CIRAS and CIDMS CIRAS CIDMS All Incidents Initial Report (5Ws/1H) Desk Officer / Crime Registrar / Crime Analyst Starting History Developed to digitize blotter book, aid in UCPER. To Analyze Crime situation in a given area to enhance police mobilization / deployment and aid in crime prevention Crimes subjected to investigation Entire Case Folder (Incident, Investigation, Prosecution Resolution, Court Decision) Investigator on Case / Case Monitoring Personnel / C, Invest Complete Case History Developed for PNP s need of a unified Case Management System, for cross-referencing cases, aid in solving cases, case folder backup / repository, case folder monitoring reports (status/stats)
15 Web CIDMS POLICIES Account activation will depend on Unit endorsement letter signed by Head of Unit. No endorsement = No account activation. Types of user account Trainer Can be used for practice and teaching purposes, encoded information while using this type of account will not be treated/counted as actual data. Encoder Limited to add case and inquiries of own encoded case Investigator Add, update cases and inquiries Supervisor Inquiries (viewing of all cases nationwide)
16 Web CIDMS POLICIES For Investigator/IOC that will be reassigned, outgoing IOC must properly turn-over hard-copy of case folder records to incoming IOC with supervision of supervisors (Chief Investigator). How do we turn-over case folder records in CIDMS? Turn-over of case folder records on Web CIDMS will be dependent on endorsement letter signed by Head of Unit.
17 Web CIDMS POLICIES What data are we storing in CIDMS? Content of the entire Case folders (all cases subjected to an investigation either cleared, solved or unsolved. Either it has been filed in the prosecutor s office or not. And either filed in a court of law or not).
18 Web CIDMS POLICIES Question: Are we allowed to show records in CIDMS to any person who is not a member of the PNP? Answer: NO! Case folders are confidential. CIDMS is strictly for internal use of the PNP only. Even Investigators do not like other officers to view case folders that they are currently investigating to avoid having the investigation compromised.
19 Web CIDMS POLICIES Warning on viewing E-Docs in CIDMS? E-Documents includes all kinds of confidential documents in a case folder. It may include potentially disturbing graphic content depicting explicit violence, gore and death. You are restricted from showing it to any other person specially relatives of the victim, to prevent them from being shocked, offended or upset.
20 Frequently Asked Questions What is the recommended minimum hardware and software requirements of CIDMS? Intel Core i3 processor or equivalent or higher 2 gigabytes RAM memory or higher 160 gigabytes hard disk space High speed Automatic Document Feeder/ADF scanner (for scanning case folders in pdf format) Windows 7 Operating System or higher MS Office Adobe Acrobat Reader
21 Frequently Asked Questions How can we upload scanned documents if we don t have a scanner? You can use mobile apps like CamScan (available for iphone and android) to take a photos of documents, save it in PDF format and transfer it to your pc for uploading in CIDMS.
22
23 What is the order of priority with respect to cases that will be encoded into the CIDMS? Task Force USIG (TF USIG) cases (Killings of Activist and Media Practitioners, Death of Foreign Nationals, Labor-Related Killings and Enforced Disappearances) Task Force Judges, Prosecutors and IBP Lawyers (TF JPL) cases Task Force Elected Government Officials (TF EGO) cases Drug related cases Election-Related Incidents (ERIs) Environmental Cases (illegal logging, illegal mining, illegal fishing) Torture cases Frequently Asked Questions Committee on Legal Action (COLA) cases Other Heinous and Sensational cases All other cases subjected to an investigation
24 Frequently Asked Questions How many cases need to be encoded into the CIDMS per day? A minimum of two (2) cases (case folders) per day What type of file must only be attached into the e-docs portion of CIDMS? All types of document files (Legal, Forensic, Photos of crime scene/evidences) can be attached to the CIDMS. Files need to be converted to PDF format before attaching to reduce the size of the files, save space and speed-up the attaching process.
25 Frequently Asked Questions Who is the end-user/main user of the CIDMS? The IOC Who are the personnel needed to be trained in the use of CIDMS? IOC as end-user/main user Chief, Investigation as supervisor Crime Registrar for continuity IT Officer/PNCO for technical assistance in the cascading
26 What Offices are primarily responsible (OPR) in the implementation and cascading of CIDMS? NHQ DIDM PRO RIDMD DISTRICT/CPO/PPO DIDMD/CIDMD/PIDMB CPS/MPS/STN IDMS NOSUs Frequently Asked Questions What is the task of the IT Officers/PNCOs in the implementation and cascading of CIDMS? Their task is only limited to providing technical assistance when requested by the RIDMD/DIDMD/CIDMD/PIDMB/IDMS or NOSUs. Hence, no IT Officer/PNCO shall cascade the CIDMS without the request for technical assistance and presence of the OPR.
27 Frequently Asked Questions Where can we lodge any inquiries on the investigation and technical aspect of CIDMS? Investigation Aspect: NHQ DIDM PRO RIDMD DISTRICT/CPO/PPO DIDMD/CIDMD/PIDMB CPS/MPS/STN IDMS NOSUs Technical Aspect: PRO/District/NOSU IT Officer/PNCO
28 Account Activation Support DIDM Task Force USIG Hotline (02) Local 3650 DIDM IT Division Hotline (02) Local 3479 Rank/Name/Designation Account Activation For Mobile/ PO2 NORITA CESAR DELA CRUZ PRO (Globe/TM) ITMS PNCO/Action PNCO Task Force USIG, DIDM norita.delacruz@didm.pnp.gov.ph PO2 EULYSSES PELAYO DELA CRUZ PRO (Globe/TM) ITMS PNCO/Action PNCO PRO 4B didm_tfusig@yahoo.com Task Force USIG, DIDM PO2 LOVELY SIUAGAN PRO (Smart/SUN) ITMS PNCO/Action PNCO PRO ARMM lovely.siuagan@didm.pnp.gov.ph Task Force USIG, DIDM SPO1 JERLYNE TINOY PRO (Globe/TM) Task Force USIG, DIDM PRO 8 jerlyne.tinoy@didm.pnp.gov.ph
29 Account Activation Support Rank/Name/Designation Account Activation For Mobile/ NUP Roselyn C Dela Cruz PRO (Sun) ITMS NUP PRO COR roselyn.delacruz@didm.pnp.gov.ph ITD, DIDM NUP Dexter P Robles PRO 4A (Globe/TM) ITMS NUP PRO 4B (SUN) ITD, DIDM PRO 5 dexter.robles@didm.pnp.gov.ph NUP Volmer C Andrabado PRO (Globe/TM) ITMS NUP PRO 7 volmer.andrabado@didm.pnp.gov.ph ITD, DIDM PRO 8 NUP Michael DC Baclig PRO (Smart/Talk and Text) ITMS NUP PRO 10 michael.baclig@didm.pnp.gov.ph ITD, DIDM PRO 11 PRO ARMM
30 Technical Support Rank/Name/Designation Roles/Technical Support for; Mobile/ NUP Jason Tacorda Web Server Admin (Globe/TM) Computer Programmer Database Admin Support Programmer/Debugging Account Related Concerns NUP Jasmin Ponce User Login (Smart/Sun) Information Systems Analyst Inquiry Searching Update Case Searching Drug Evidences Tab Other Evidences Tab
31 Technical Support Rank/Name/Designation Roles/Technical Support for; Mobile/ NUP Mark Aguho Firearms Evidences Tab (Globe/TM) Computer Programmer Vehicle Evidences Tab Evidence Custodian List E-Documents Tab Case Journal Tab NUP Gerogil Escabosa PNP Officers Tab (Smart/Sun) Computer Programmer Persons Involved Tab PO2 MOHAMED TALAUE PANAGA Case Details Tab (Globe/TM) Computer Programmer Prosecution Tab Court Tab
32 For All Mankind
Introduction to Cloud Services
Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud
More informationMobile Audio/Video Recorder Policy
Mobile Audio/Video Recorder Policy 446.1 PURPOSE AND SCOPE The Fort Collins Police Services has equipped selected vehicles and officers with a Mobile Audio/Video Recording (MAV) system and also allows
More informationPrivacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction
Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we
More informationHow To Solve A Violent Home Invasion With A United Force
Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone
More informationAvenger Enterprise Sales Brochure
Avenger Enterprise Sales Brochure Our Web Based Software Suite Includes: C.A.D. (Computer Aided Dispatch) Media Direct Access (Calls for Service) R.M.S. (Record Management System) with Electronic Report
More informationEstablishing a State Cyber Crimes Unit White Paper
Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center
More informationDOCSVAULT Document Management System for everyone
Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing
More informationThe President s Task Force on Identity Theft and The FTC s Role in Identity Theft
The President s Task Force on Identity Theft and The FTC s Role in Identity Theft Joanna P. Crane Federal Trade Commission The views expressed are those of the speaker and not necessarily those of the
More informationSpyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
More informationSynergis Software 18 South 5 TH Street, Suite 100 Quakertown, PA 18951 +1 215.302.3000, 800.836.5440 www.synergissoftware.com version 20150330
Synergis Software 18 South 5 TH Street, Suite 100 Quakertown, PA 18951 +1 215.302.3000, 800.836.5440 www.synergissoftware.com version 20150330 CONTENTS Contents... 2 Overview... 2 Adept Server... 3 Adept
More informationRemote Deposit Capture Installation Guide
Remote Deposit Capture Installation Guide Please contact businessbanking@farmingtonbankct.com or call 860-284-6549 with any questions. Remote Deposit Capture Installation Instructions It is necessary to
More informationRemote Deposit Capture Installation Guide
Remote Deposit Capture Installation Guide Please contact businessbanking@farmingtonbankct.com or call 860-284-6549 with any questions. Table of Contents Internet Explorer Trusted Sites 2 Verify ActiveX
More informationIP Office IP Office Softphone Installation
Softphone Installation - Issue 1a - (15 March 2010) 2010 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete and accurate
More information1342) Prerequisit. cies. Investigative interview and C9, F9,) interviews. research, the. C. Sketching. the Crime and students. Scene.
Criminal Investigation (CJSA 1342) Credit: 3 semester credit hours (3 hours lecture) Prerequisit te/co-requisite: None Course Description Investigative theory; collection and preservation of evidence;
More informationMiCJIN. Software Systems and Services Available. Michigan Criminal Justice Information Network
Michigan State Police Criminal Justice Information Center (517) 336-6574 June 2006 Software Systems and Services Available The sharing of information in a highly secure environment has become increasingly
More informationINSTALLATION MINIMUM REQUIREMENTS. Visit us on the Web www.docstar.com
INSTALLATION MINIMUM REQUIREMENTS Visit us on the Web www.docstar.com Clients This section details minimum requirements for client workstations that use. Workstation (Scan) Windows 7 (32/64 bit); Windows
More informationINFORMATION TECHNOLOGY MANAGER Salary Range: 22 (Management Salary Schedule)
February 2013 CITY OF ROCKLIN INFORMATION TECHNOLOGY MANAGER Salary Range: 22 (Management Salary Schedule) DEFINITION Under general direction, to plan, organize, manage, and supervise the efforts of the
More informationAPPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal
APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal aspects Igor Osyka, LL.M, PhD Kharkiv University of Law and Economics Warsaw 2011 Legal regulation Council of Europe
More informationPreservation for a Safer World
Preservation and Archiving Special Interest Group (PASIG) Preservation for a Safer World Hong-Eng Koh Senior Director (Global Lead) Justice & Public Safety A Very Fragmented World
More informationInstaFile. Complete Document management System
InstaFile Complete Document management System Index : About InstaFile 1.1 What is InstaFile 1.2 How does it work 1.3 Where you can use InstaFile 1.4 Why only InstaFile InstaFile features and benefits Start
More informationFEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft
FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity
More information2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012
2012 雲 端 資 安 報 告 黃 建 榮 資 深 顧 問 - Verizon Taiwan August 2012 1 It s All About Security Protecting assets from threats that could impact the business Protecting Assets... Stationary data Data in transit
More informationUNITED STATES BANKRUPTCY COURT DISTRICT OF ARIZONA
UNITED STATES BANKRUPTCY COURT DISTRICT OF ARIZONA CASE MANAGEMENT/ELECTRONIC CASE FILING (CM/ECF) SYSTEM LIMITED USE/SERVICE OF PROCESS REGISTRATION FORM This form is to be used to register for LIMITED
More informationUnited Nations Office on Drugs and Crime
UNODC contribution to combat Crime A UNODC contribution to combat CRIME A A product of the Information Technology Service Nations Office on Drugs and Crime United Nations Office on Drugs and Crime United
More informationService Level Agreement
Service Level Agreement Service: Web Hosting (cpanel) Version: 2015.07.01 v1.0 Valid: 07/01/2015-06/30/2016 Service Details: Description A web site hosting service using the industry leading cpanel application
More informationInformation Security Operational Procedures Banner Student Information System Security Policy
Policy No: 803 Area: Information Technology Services Adopted: 8/6/2012 Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides
More informationTHE POLICE SERVICE IN FINLAND
THE FINNISH POLICE THE POLICE SERVICE IN FINLAND In Finland the police have a duty to secure judicial and social order, maintain public order and security, prevent and investigate crimes and forward cases
More informationCRIMINAL DEFENSE FAQ. QUESTION: Am I required to allow law enforcement be allowed to search my house or my car?
THE LAW OFFICES OF SCOTT L. KRAMER CRIMINAL DEFENSE FAQ ANSWERS FROM AN DELAWARE COUNTY ATTORNEY: QUESTION: Am I required to allow law enforcement be allowed to search my house or my car? No. You are never
More informationSage CRM Technical Specification
Sage CRM Technical Specification Client Software This document outlines the recommended minimum software and hardware requirements for running Sage CRM. Please note that while the document refers to Sage
More informationInternational cooperation between law enforcement authorities
Project against Economic Crime (PECK) International cooperation between law enforcement authorities Iliya Pulov International Operational Cooperation Directorate (IOCD), Ministry of Interior BULGARIA 23
More informationThe global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
More informationQHR Accuro EMR IT Hardware Requirements
QHR Accuro EMR IT Hardware Requirements Hardware Requirements for Accuro EMR Table of Contents Local Install Platform:... 3 Server Requirements:... 3 Workstation Requirements:... 4 Peripheral Requirements:...
More informationHardware/Software Requirements For Self-Hosting Multi Server
Hardware/Software Requirements For Self-Hosting Multi Server Ebix recommends two or more servers for sites with more than 20 active users. The first step is deciding which type of configuration would best
More informationivos Technical Requirements V06112014 For Current Clients as of June 2014
ivos Technical Requirements V06112014 For Current Clients as of June 2014 The recommended minimum hardware and software specifications for ivos version 4.2 and higher are described below. Other configurations
More informationCity of Oak Creek. Class Title: Emergency Services Dispatcher. Division: Administrative Location: Police Station
City of Oak Creek Class Title: Emergency Services Dispatcher Department: Police Division: Administrative Location: Police Station Job Code Number: Grade Number: Non-Union Summary Description Performs a
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
More informationOVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft
OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3
More informationWYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME
WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME HELPING LAW ENFORCEMENT AGENCIES SOLVE CRIMES FASTER, WITH LOWER COSTS AND FEWER RESOURCES. 1 Wynyard Group Advanced Crime
More informationPROGRAMME "PREVENTION OF AND FIGHT AGAINST CRIME" 2007-2013 CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS
PROGRAMME "PREVENTION OF AND FIGHT AGAINST CRIME" 2007-2013 CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS Action Grants 2012 within the Framework Partnership Agreements Deadline 1: 10 August
More informationCENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION. Semester Hours Credit: 3
CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION INSTRUCTOR: OFFICE HOURS: Semester Hours Credit: 3 I. Introduction A. This course covers the fundamentals of criminal investigations
More informationThomson Reuters CLEAR THE SMARTER WAY TO GET YOUR INVESTIGATIVE FACTS STRAIGHT.
Thomson Reuters CLEAR THE SMARTER WAY TO GET YOUR INVESTIGATIVE FACTS STRAIGHT. CLEAR. EASIER SEARCH. BETTER RESULTS. SMARTER PREFERENCES. Bring the facts into focus. CLEAR features a simple, intuitive
More informationCyber Security Response to Physical Security Breaches
Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically
More informationResponse Checklist. Key issues to consider:
Response Checklist During the response phase, which occurs immediately after an incident, law enforcement officials, first responders, victim service providers, and others will manage, coordinate, and
More informationPhillip Kruss Chief, Information Technology Service
The gocase application is UNODC s Case Management System for Member States Law Enforcement and Regulatory Agencies & Criminal Intelligence and Prosecutorial Services gocase.unodc.org UNODC s Information
More informationLegal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
More informationThe Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations. State of Maryland.
The Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations State of Maryland June 1, 2011 1 Section B. The Criminal Justice Dashboard (Dashboard) is
More informationInstallation Process
Installation Process Aivika One Lite New Dynamic Solutions BVBA Contents Contents... 2 Introduction... 3 Aivika One Lite introduction... 4 Concept... 4 Components... 4 Deploying Aivika One Lite... 5 Supported
More informationWeb Server (IIS) Requirements
Web Server (IIS) Requirements Important! The Web Server (IIS) cannot be the primary or backup domain controller. Operating System Windows Server 2012 R2 Windows Server 2008 R2 (64-bit with IIS running
More informationJOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015
`STATE OF OHIO (DAS) CLASSIFICATION SPECIFICATION SERIES PURPOSE CLASSIFICATION SERIES Medicaid Special Agent MAJOR AGENCIES Attorney General Only SERIES NUMBER 2614AG EFFECTIVE 11/15/2015 The purpose
More informationsecurityserver Unparalleled management and detection of security, environmental, and disaster control resources.
securityserver Unparalleled management and detection of security, environmental, and disaster control resources. Map cameras & sensors in server rooms or buildings in cities AKCP securityserver puts you
More informationEuropol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011
Europol Cybercrime Centre The perspective of Europol on Cybercrime Courmayeur Mont Blanc, Italy, 2-4 December 2011 The Threat The threat from cybercrime is multi-dimensional, targeting citizens, businesses,
More informationAgency Operations Plan 2015-17
Agency Operations Plan 2015-17 Agency: ND Insurance Department Line of Business: (optional) Contact: Name: Laurie Scully Title: Computer & Network Specialist II Phone #: 701.328.2503 Email: lscully@nd.gov
More informationcase asset management database software electronic case notes
case asset management powerful security configurable data forms comparative analysis case asset management database software electronic case notes messaging configurable reports LIMS integration www.mideosystems.com
More informationTHREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
More informationAvira Secure Backup INSTALLATION GUIDE. HowTo
Avira Secure Backup INSTALLATION GUIDE HowTo Table of contents 1. Introduction... 3 2. System Requirements... 3 2.1 Windows...3 2.2 Mac...4 2.3 ios (iphone, ipad and ipod touch)...4 3. Avira Secure Backup
More informationCLASS SPECIFICATION Systems Support Analyst I
San Diego Unified Port District Class Code: B837-UE03 CLASS SPECIFICATION Systems Support Analyst I FLSA Status: EEOC Job Category: Classified: Union Representation: Exempt Professionals No Unrepresented
More informationInstallation Instructions
Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand
More informationPLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.
Brightcore Consulting Moodle Hosting Service Agreement Last Revised: September 30, 2013 PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.
More informationTo do Justice, as no one is above the Law nor beneath its protection.
Michael L. Ramsey, District Attorney District Attorney Department Summary Mission Statement To do Justice, as no one is above the Law nor beneath its protection. Department Description and Key Issues The
More informationElectronic Case Files System User s Manual
Getting Started Introduction Electronic Case Files System User s Manual This manual provides instructions on how to use the Electronic Filing System to file documents with the Bankruptcy Court, or to view
More informationGoing Paperless. An approach for Housing Authorities
Going Paperless An approach for Housing Authorities Going Paperless Scott Gleason, President Management Computer Service, Inc. Going Paperless An approach for Housing Authorities Going Paperless Why Go
More informationWEST VIRGINIA STATE POLICE LEGAL SERVICES
WEST VIRGINIA STATE POLICE LEGAL SERVICES 2011 Legislative Update Laws Passed that Affect Law Enforcement The following information represents both synopsis and full-text of laws passed during the 2011
More information10128/16 LB/dk 1 DGD 1C
Council of the European Union Brussels, 13 June 2016 (OR. en) 10128/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 8770/16, 8819/16 Subject:
More informationDell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationAttach receipt options:
Attaching Receipts and Receipt Store There are a few ways to attach receipts to an expense report. You will only need to choose one of the following options when attaching receipts. You can add receipts
More informationHow to Use This Manual
Your Guide How to Use This Manual 1. Experience basic operations of Rack2-Filer Smart Let's Try (Page 8) 2. Learn useful functions of Rack2-Filer Smart Let's Learn More (Page 24) For the terms and abbreviations
More informationProposal: Illinois Justice Network Portal
Proposal: Illinois Justice Network Portal Summary This proposal addresses the strategic issues that have been identified as being crucial to criminal justice information sharing and recommends the establishment
More informationPage 1 of 6 Position Code #P10213. REPORTS TO: IT Director BRANCH: Information & Technology. ASSOCIATION: Civilian LOCATION: Headquarters
Page 1 of 6 Position Code #P10213 POSITION TITLE: PRIDE Help Desk Analyst DEPT/DIV.: Support Services REPORTS TO: IT Director BRANCH: Information & Technology ASSOCIATION: Civilian LOCATION: Headquarters
More informationRemote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x)
Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x) Start your Internet Explorer browser and direct it to the faculty home page. Click on the link Remote Access,
More informationCrime Mapping and Analysis Using GIS
Crime Mapping and Analysis Using GIS C.P. JOHNSON Geomatics Group, C-DAC, Pune University Campus, Pune 411007 johnson@cdac.ernet.in 1. Introduction The traditional and age-old system of intelligence and
More informationAppendix A: Encrypting a File and / or Email Message
Appendix A: Encrypting a File and / or Email Message Encryption is defined as the conversion of something to code or symbols so that its contents cannot be understood if intercepted. USDB has approved
More informationFor purposes of this policy, the following terms will be defined as follows.
DOMESTIC VIOLENCE AND THE WORKPLACE POLICY STATEMENT The City University of New York ( CUNY ) disapproves of violence against women, men, or children in any form, whether as an act of workplace violence
More informationhttps://login.microsoftonline.com
MICROSOFT OFFICE 365 PRO PLUS Through an EES agreement that is maintained with Microsoft, Calumet College of St. Joseph is able to provide Microsoft Office 365 Pro Plus for currently active students, faculty
More informationDefinitions For purposes of this policy, the following terms will be defined as follows.
The College at Brockport State University of New York Policy Title: Domestic Violence in the Workplace Policy Category: Human Resources Responsible Office: Human Resources Date: Revised December 2013 Domestic
More informationMassachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders
Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal
More informationRemote Access Details
Practice Name: Hardware Supplier and Support Organisation Name: Contact Name: This document contains important information regarding the configuration and ongoing use of your hardware and software. It
More informationInformation Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
More informationMSOW. MSO for the Web MSONet Workstation Configuration Guide
MSOW MSO for the Web MSONet Workstation Configuration Guide For personal and public computer users accessing MSOW Practitioner Home Page (PHP) and Primary Source Verification (PSV) Updated June 4, 2013
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationAmcrest 960H DVR Quick Start Guide
Amcrest 960H DVR Quick Start Guide Welcome Thank you for purchasing our Amcrest 960H DVR! This quick start guide will help you become familiar with our DVR in a very short time. Before installation and
More informationMCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
More informationStandard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
More informationTransnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section
Transnational Challenges and Approaches to Investigating Trafficking Offences Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section Trafficking in persons: a low risk / high profit crime
More informationHow To Explain Your Criminal History In Florida
KNOW YOUR RECORD What Teens Should Know About Their Delinquency Record Law Office of Julianne M. Holt Public Defender, Thirteenth Judicial Circuit of Florida 700 East Twiggs Street, Fifth Floor P.O. Box
More informationHow To Get Help In Alaska
Information For Victims of Domestic Violence If you are a victim of domestic violence, and the police respond to assist you, they are required by law to read certain portions of this "booklet to you. An
More informationSchool of Human Services San Diego Campus 2011 Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act Report Emergencies:
School of Human Services San Diego Campus 2011 Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act Report (known as the Clery Report) Emergencies: Dial [(619) 582 4002] ([911
More informationcase image management database software electronic case notes
case management powerful security configurable field sets comparative analysis ACE-V documentation case image management database software electronic case notes messaging configurable reports LIMS integration
More informationHOW TO OBTAIN AND POST AN IMMIGRATION BOND: A Guide for Non-Citizens in Detention
HOW TO OBTAIN AND POST AN IMMIGRATION BOND: A Guide for Non-Citizens in Detention January 2011 1 AM I ELIGIBLE FOR A BOND? Figuring out whether or not you are eligible for a bond is a very complicated
More informationIn an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
More informationMedInformatix System Requirements
MedInformatix System Requirements Acentec, Inc. A MedInformatix installation requires a workstation for each user who will access the system and a central server to store and process the data. A large
More informationfi-7160/ fi-7260/ fi-7180/ fi-7280 Getting Started Image Scanner Checking the Components P3PC-4252-01EN
P3PC-4252-01EN fi-7160/ fi-7260/ fi-7180/ fi-7280 Getting Started Image Scanner Thank you for purchasing the fi-7160/fi-7260/fi-7180/fi-7280 color image scanner. This manual describes the preparation required
More informationWindows XP is no longer supported by Microsoft, effectively making it noncompliant
System Requirements This page has been formulated for the sole purpose of general specifications only and is NOT to be used as a final hardware consultation. Please consult with the ChiroTouch sales and/or
More informationAs part of their course on law and/or sociology in this module, participants will be able to:
Correctional Service Service correctionnel Service correctionnel Correctional Service Law Correctional Service : At the Heart of Criminal Justice Description The Correctional Service of : At the Heart
More informationGetting Started. Image Scanner. Checking the Components P3PC-3362-02EN
P3PC-3362-02EN Getting Started Image Scanner Thank you for purchasing the fi-6130z/fi-6230z/fi-6140z/fi-6240z color image scanner. This manual describes the preparation required to use this product. Follow
More informationA Workflow for Patient Electronic Signatures and Document Storage
A Workflow for Patient Electronic Signatures and Document Storage Presented by: Margery Beck System Analyst Jennifer Boldin Application Support Analyst MIMA: Independent 125-provider multi-specialty group
More informationWhite Paper Automated Digital Evidence Collection and Publishing: Reduce Investigation Time and Costs May 2011
White Paper Automated Digital Evidence Collection and Publishing: Reduce Investigation Time and Costs May 2011 FBI 2009 Report: 1,756 terabytes of data processed 58,609 pieces of digital media 21,810 CDs
More informationMISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if
More informationLinux and Law Enforcement
Linux and Law Enforcement Challenges and Opportunities Dr. Joshua I. James Digital Forensic Investigation Research Laboratory SoonChunHyang University Joshua@cybercrimetech.com http://forensics.sch.ac.kr
More informationStrategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More information