Introduction to Case Information Database Management System (CIDMS)

Size: px
Start display at page:

Download "Introduction to Case Information Database Management System (CIDMS)"

Transcription

1 Introduction to Case Information Database Management System (CIDMS)

2 Lesson Goals This topic is designed for the participants to learn about CIDMS

3 Objectives After this lesson, the participants will be able to: 1. Define what is CIDMS 2. Explain how CIDMS developed 3. Explain the objectives of CIDMS 4. Enumerate what information we can store in CIDMS 5. Explain why CIDMS/NGIS? 6. Explain the NGIS Concept 7. Explain the differences between CIRAS and CIDMS 8. Explain CIDMS Policies 9. Answer the Frequently Asked Questions about CIDMS

4 What is CIDMS? CIDMS is the CASE MANAGEMENT INFORMATION SYSTEM of the PNP specifically designed for Investigators in managing case files/folders The CIDMS acronym stands for Case Information Database Management System A program initially used by CIDG that was enhanced by DIDM thru the technical assistance of ITMS First It was a LAN/stand-alone, now it is a Web-Based information system using SQL as back-end and visual basic.net/php as front-end Web-based CIDMS domain name is

5 How was CIDMS developed? By gathering inputs from the end-users - Investigators from Police Stations (NCRPO & Regions) Inputs from Investigators/Case Monitoring Personnel from DIDM, CIDG, WCPC, AKG, ACG, AVSEGROUP, MG. Inputs from evidence concerned personnel, subject-matter experts and forensic examiners from HPG-Motor Vehicle Clearance Division, CSG- Firearms and Explosives Office and Crime Laboratory. Inputs from Legal Officer of DIDM (detailed, from Legal Service) Inputs from Information Technology Officers of DICTM and ITMS And also from learning about information systems of other government agencies (like Supreme Court s E-courts) and other countries (like the TIMS of Albania - was presented to the PNP).

6 Objectives of CIDMS CIDMS is a tool for Investigators to; Easily access and manage case files/folders Have a systematic recording by digitizing case files/folders Backup case folders in case we lose the case folder because of flooding, earthquake, fire and so on. Avoid voluminous records Cross-reference various cases

7 Let s review what is Criminal Investigation? Is an applied science that involves the study of facts, used to identify, locate and gather evidence to prove the guilt of the suspect to solve the case. Facts include but not limited to: Incident and Case Information Persons Involved Pieces of Evidence

8 What case Information can we store in CIDMS? Facts about the incident Facts about how the incident was reported Law enforcement officers involved Civilian persons Involved Pieces of Evidence Information on the filing and status of the case in Prosecutor s Office Court(s) of Law Electronic copy of the case files or the entire case folder

9 Why CIDMS/NGIS? Technological advancement Criminals becomes smarter and more organized Crimes becomes more complex and sophisticated Increase of crimes in which Information Technology is used (drug/human trafficking, identity theft, terrorism, cybercrimes, telecommunication fraud etc.) Need for Law Enforcement to adapt to the challenge of modern day policing (fight back) If Information technology is a means to commit a crime, it can also be a means to fight crime.

10 World Wide Web and Cybercrimes The World-Wide Web is easy to access but hard to secure. Conventional web browsers can only access the Surface Web (shallow 20%). The Deep Web (80%) is anything that a search engine can t find. The Dark Web is classified as a small portion of the Deep Web intentionally hidden, inaccessible through standard web browsers. It is being used to propagate illegal activities like selling illegal drugs online, money laundering in the advent of virtual currency (bit coins).

11 World Wide Web and Cybercrimes

12

13 NGIS CONCEPT C O CIRAS (Enhanced e-blotter & GIS) e-warrant N V E R G E N CMAS CIDMS e-roques C E e-subpoena

14 Difference between CIRAS and CIDMS CIRAS CIDMS All Incidents Initial Report (5Ws/1H) Desk Officer / Crime Registrar / Crime Analyst Starting History Developed to digitize blotter book, aid in UCPER. To Analyze Crime situation in a given area to enhance police mobilization / deployment and aid in crime prevention Crimes subjected to investigation Entire Case Folder (Incident, Investigation, Prosecution Resolution, Court Decision) Investigator on Case / Case Monitoring Personnel / C, Invest Complete Case History Developed for PNP s need of a unified Case Management System, for cross-referencing cases, aid in solving cases, case folder backup / repository, case folder monitoring reports (status/stats)

15 Web CIDMS POLICIES Account activation will depend on Unit endorsement letter signed by Head of Unit. No endorsement = No account activation. Types of user account Trainer Can be used for practice and teaching purposes, encoded information while using this type of account will not be treated/counted as actual data. Encoder Limited to add case and inquiries of own encoded case Investigator Add, update cases and inquiries Supervisor Inquiries (viewing of all cases nationwide)

16 Web CIDMS POLICIES For Investigator/IOC that will be reassigned, outgoing IOC must properly turn-over hard-copy of case folder records to incoming IOC with supervision of supervisors (Chief Investigator). How do we turn-over case folder records in CIDMS? Turn-over of case folder records on Web CIDMS will be dependent on endorsement letter signed by Head of Unit.

17 Web CIDMS POLICIES What data are we storing in CIDMS? Content of the entire Case folders (all cases subjected to an investigation either cleared, solved or unsolved. Either it has been filed in the prosecutor s office or not. And either filed in a court of law or not).

18 Web CIDMS POLICIES Question: Are we allowed to show records in CIDMS to any person who is not a member of the PNP? Answer: NO! Case folders are confidential. CIDMS is strictly for internal use of the PNP only. Even Investigators do not like other officers to view case folders that they are currently investigating to avoid having the investigation compromised.

19 Web CIDMS POLICIES Warning on viewing E-Docs in CIDMS? E-Documents includes all kinds of confidential documents in a case folder. It may include potentially disturbing graphic content depicting explicit violence, gore and death. You are restricted from showing it to any other person specially relatives of the victim, to prevent them from being shocked, offended or upset.

20 Frequently Asked Questions What is the recommended minimum hardware and software requirements of CIDMS? Intel Core i3 processor or equivalent or higher 2 gigabytes RAM memory or higher 160 gigabytes hard disk space High speed Automatic Document Feeder/ADF scanner (for scanning case folders in pdf format) Windows 7 Operating System or higher MS Office Adobe Acrobat Reader

21 Frequently Asked Questions How can we upload scanned documents if we don t have a scanner? You can use mobile apps like CamScan (available for iphone and android) to take a photos of documents, save it in PDF format and transfer it to your pc for uploading in CIDMS.

22

23 What is the order of priority with respect to cases that will be encoded into the CIDMS? Task Force USIG (TF USIG) cases (Killings of Activist and Media Practitioners, Death of Foreign Nationals, Labor-Related Killings and Enforced Disappearances) Task Force Judges, Prosecutors and IBP Lawyers (TF JPL) cases Task Force Elected Government Officials (TF EGO) cases Drug related cases Election-Related Incidents (ERIs) Environmental Cases (illegal logging, illegal mining, illegal fishing) Torture cases Frequently Asked Questions Committee on Legal Action (COLA) cases Other Heinous and Sensational cases All other cases subjected to an investigation

24 Frequently Asked Questions How many cases need to be encoded into the CIDMS per day? A minimum of two (2) cases (case folders) per day What type of file must only be attached into the e-docs portion of CIDMS? All types of document files (Legal, Forensic, Photos of crime scene/evidences) can be attached to the CIDMS. Files need to be converted to PDF format before attaching to reduce the size of the files, save space and speed-up the attaching process.

25 Frequently Asked Questions Who is the end-user/main user of the CIDMS? The IOC Who are the personnel needed to be trained in the use of CIDMS? IOC as end-user/main user Chief, Investigation as supervisor Crime Registrar for continuity IT Officer/PNCO for technical assistance in the cascading

26 What Offices are primarily responsible (OPR) in the implementation and cascading of CIDMS? NHQ DIDM PRO RIDMD DISTRICT/CPO/PPO DIDMD/CIDMD/PIDMB CPS/MPS/STN IDMS NOSUs Frequently Asked Questions What is the task of the IT Officers/PNCOs in the implementation and cascading of CIDMS? Their task is only limited to providing technical assistance when requested by the RIDMD/DIDMD/CIDMD/PIDMB/IDMS or NOSUs. Hence, no IT Officer/PNCO shall cascade the CIDMS without the request for technical assistance and presence of the OPR.

27 Frequently Asked Questions Where can we lodge any inquiries on the investigation and technical aspect of CIDMS? Investigation Aspect: NHQ DIDM PRO RIDMD DISTRICT/CPO/PPO DIDMD/CIDMD/PIDMB CPS/MPS/STN IDMS NOSUs Technical Aspect: PRO/District/NOSU IT Officer/PNCO

28 Account Activation Support DIDM Task Force USIG Hotline (02) Local 3650 DIDM IT Division Hotline (02) Local 3479 Rank/Name/Designation Account Activation For Mobile/ PO2 NORITA CESAR DELA CRUZ PRO (Globe/TM) ITMS PNCO/Action PNCO Task Force USIG, DIDM norita.delacruz@didm.pnp.gov.ph PO2 EULYSSES PELAYO DELA CRUZ PRO (Globe/TM) ITMS PNCO/Action PNCO PRO 4B didm_tfusig@yahoo.com Task Force USIG, DIDM PO2 LOVELY SIUAGAN PRO (Smart/SUN) ITMS PNCO/Action PNCO PRO ARMM lovely.siuagan@didm.pnp.gov.ph Task Force USIG, DIDM SPO1 JERLYNE TINOY PRO (Globe/TM) Task Force USIG, DIDM PRO 8 jerlyne.tinoy@didm.pnp.gov.ph

29 Account Activation Support Rank/Name/Designation Account Activation For Mobile/ NUP Roselyn C Dela Cruz PRO (Sun) ITMS NUP PRO COR roselyn.delacruz@didm.pnp.gov.ph ITD, DIDM NUP Dexter P Robles PRO 4A (Globe/TM) ITMS NUP PRO 4B (SUN) ITD, DIDM PRO 5 dexter.robles@didm.pnp.gov.ph NUP Volmer C Andrabado PRO (Globe/TM) ITMS NUP PRO 7 volmer.andrabado@didm.pnp.gov.ph ITD, DIDM PRO 8 NUP Michael DC Baclig PRO (Smart/Talk and Text) ITMS NUP PRO 10 michael.baclig@didm.pnp.gov.ph ITD, DIDM PRO 11 PRO ARMM

30 Technical Support Rank/Name/Designation Roles/Technical Support for; Mobile/ NUP Jason Tacorda Web Server Admin (Globe/TM) Computer Programmer Database Admin Support Programmer/Debugging Account Related Concerns NUP Jasmin Ponce User Login (Smart/Sun) Information Systems Analyst Inquiry Searching Update Case Searching Drug Evidences Tab Other Evidences Tab

31 Technical Support Rank/Name/Designation Roles/Technical Support for; Mobile/ NUP Mark Aguho Firearms Evidences Tab (Globe/TM) Computer Programmer Vehicle Evidences Tab Evidence Custodian List E-Documents Tab Case Journal Tab NUP Gerogil Escabosa PNP Officers Tab (Smart/Sun) Computer Programmer Persons Involved Tab PO2 MOHAMED TALAUE PANAGA Case Details Tab (Globe/TM) Computer Programmer Prosecution Tab Court Tab

32 For All Mankind

Introduction to Cloud Services

Introduction to Cloud Services Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud

More information

Mobile Audio/Video Recorder Policy

Mobile Audio/Video Recorder Policy Mobile Audio/Video Recorder Policy 446.1 PURPOSE AND SCOPE The Fort Collins Police Services has equipped selected vehicles and officers with a Mobile Audio/Video Recording (MAV) system and also allows

More information

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we

More information

How To Solve A Violent Home Invasion With A United Force

How To Solve A Violent Home Invasion With A United Force Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone

More information

Avenger Enterprise Sales Brochure

Avenger Enterprise Sales Brochure Avenger Enterprise Sales Brochure Our Web Based Software Suite Includes: C.A.D. (Computer Aided Dispatch) Media Direct Access (Calls for Service) R.M.S. (Record Management System) with Electronic Report

More information

Establishing a State Cyber Crimes Unit White Paper

Establishing a State Cyber Crimes Unit White Paper Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center

More information

DOCSVAULT Document Management System for everyone

DOCSVAULT Document Management System for everyone Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing

More information

The President s Task Force on Identity Theft and The FTC s Role in Identity Theft

The President s Task Force on Identity Theft and The FTC s Role in Identity Theft The President s Task Force on Identity Theft and The FTC s Role in Identity Theft Joanna P. Crane Federal Trade Commission The views expressed are those of the speaker and not necessarily those of the

More information

Spyware Doctor Enterprise Technical Data Sheet

Spyware Doctor Enterprise Technical Data Sheet Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware

More information

Synergis Software 18 South 5 TH Street, Suite 100 Quakertown, PA 18951 +1 215.302.3000, 800.836.5440 www.synergissoftware.com version 20150330

Synergis Software 18 South 5 TH Street, Suite 100 Quakertown, PA 18951 +1 215.302.3000, 800.836.5440 www.synergissoftware.com version 20150330 Synergis Software 18 South 5 TH Street, Suite 100 Quakertown, PA 18951 +1 215.302.3000, 800.836.5440 www.synergissoftware.com version 20150330 CONTENTS Contents... 2 Overview... 2 Adept Server... 3 Adept

More information

Remote Deposit Capture Installation Guide

Remote Deposit Capture Installation Guide Remote Deposit Capture Installation Guide Please contact businessbanking@farmingtonbankct.com or call 860-284-6549 with any questions. Remote Deposit Capture Installation Instructions It is necessary to

More information

Remote Deposit Capture Installation Guide

Remote Deposit Capture Installation Guide Remote Deposit Capture Installation Guide Please contact businessbanking@farmingtonbankct.com or call 860-284-6549 with any questions. Table of Contents Internet Explorer Trusted Sites 2 Verify ActiveX

More information

IP Office IP Office Softphone Installation

IP Office IP Office Softphone Installation Softphone Installation - Issue 1a - (15 March 2010) 2010 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete and accurate

More information

1342) Prerequisit. cies. Investigative interview and C9, F9,) interviews. research, the. C. Sketching. the Crime and students. Scene.

1342) Prerequisit. cies. Investigative interview and C9, F9,) interviews. research, the. C. Sketching. the Crime and students. Scene. Criminal Investigation (CJSA 1342) Credit: 3 semester credit hours (3 hours lecture) Prerequisit te/co-requisite: None Course Description Investigative theory; collection and preservation of evidence;

More information

MiCJIN. Software Systems and Services Available. Michigan Criminal Justice Information Network

MiCJIN. Software Systems and Services Available. Michigan Criminal Justice Information Network Michigan State Police Criminal Justice Information Center (517) 336-6574 June 2006 Software Systems and Services Available The sharing of information in a highly secure environment has become increasingly

More information

INSTALLATION MINIMUM REQUIREMENTS. Visit us on the Web www.docstar.com

INSTALLATION MINIMUM REQUIREMENTS. Visit us on the Web www.docstar.com INSTALLATION MINIMUM REQUIREMENTS Visit us on the Web www.docstar.com Clients This section details minimum requirements for client workstations that use. Workstation (Scan) Windows 7 (32/64 bit); Windows

More information

INFORMATION TECHNOLOGY MANAGER Salary Range: 22 (Management Salary Schedule)

INFORMATION TECHNOLOGY MANAGER Salary Range: 22 (Management Salary Schedule) February 2013 CITY OF ROCKLIN INFORMATION TECHNOLOGY MANAGER Salary Range: 22 (Management Salary Schedule) DEFINITION Under general direction, to plan, organize, manage, and supervise the efforts of the

More information

APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal

APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal aspects Igor Osyka, LL.M, PhD Kharkiv University of Law and Economics Warsaw 2011 Legal regulation Council of Europe

More information

Preservation for a Safer World

Preservation for a Safer World Preservation and Archiving Special Interest Group (PASIG) Preservation for a Safer World Hong-Eng Koh Senior Director (Global Lead) Justice & Public Safety A Very Fragmented World

More information

InstaFile. Complete Document management System

InstaFile. Complete Document management System InstaFile Complete Document management System Index : About InstaFile 1.1 What is InstaFile 1.2 How does it work 1.3 Where you can use InstaFile 1.4 Why only InstaFile InstaFile features and benefits Start

More information

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity

More information

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012 2012 雲 端 資 安 報 告 黃 建 榮 資 深 顧 問 - Verizon Taiwan August 2012 1 It s All About Security Protecting assets from threats that could impact the business Protecting Assets... Stationary data Data in transit

More information

UNITED STATES BANKRUPTCY COURT DISTRICT OF ARIZONA

UNITED STATES BANKRUPTCY COURT DISTRICT OF ARIZONA UNITED STATES BANKRUPTCY COURT DISTRICT OF ARIZONA CASE MANAGEMENT/ELECTRONIC CASE FILING (CM/ECF) SYSTEM LIMITED USE/SERVICE OF PROCESS REGISTRATION FORM This form is to be used to register for LIMITED

More information

United Nations Office on Drugs and Crime

United Nations Office on Drugs and Crime UNODC contribution to combat Crime A UNODC contribution to combat CRIME A A product of the Information Technology Service Nations Office on Drugs and Crime United Nations Office on Drugs and Crime United

More information

Service Level Agreement

Service Level Agreement Service Level Agreement Service: Web Hosting (cpanel) Version: 2015.07.01 v1.0 Valid: 07/01/2015-06/30/2016 Service Details: Description A web site hosting service using the industry leading cpanel application

More information

Information Security Operational Procedures Banner Student Information System Security Policy

Information Security Operational Procedures Banner Student Information System Security Policy Policy No: 803 Area: Information Technology Services Adopted: 8/6/2012 Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides

More information

THE POLICE SERVICE IN FINLAND

THE POLICE SERVICE IN FINLAND THE FINNISH POLICE THE POLICE SERVICE IN FINLAND In Finland the police have a duty to secure judicial and social order, maintain public order and security, prevent and investigate crimes and forward cases

More information

CRIMINAL DEFENSE FAQ. QUESTION: Am I required to allow law enforcement be allowed to search my house or my car?

CRIMINAL DEFENSE FAQ. QUESTION: Am I required to allow law enforcement be allowed to search my house or my car? THE LAW OFFICES OF SCOTT L. KRAMER CRIMINAL DEFENSE FAQ ANSWERS FROM AN DELAWARE COUNTY ATTORNEY: QUESTION: Am I required to allow law enforcement be allowed to search my house or my car? No. You are never

More information

Sage CRM Technical Specification

Sage CRM Technical Specification Sage CRM Technical Specification Client Software This document outlines the recommended minimum software and hardware requirements for running Sage CRM. Please note that while the document refers to Sage

More information

International cooperation between law enforcement authorities

International cooperation between law enforcement authorities Project against Economic Crime (PECK) International cooperation between law enforcement authorities Iliya Pulov International Operational Cooperation Directorate (IOCD), Ministry of Interior BULGARIA 23

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

QHR Accuro EMR IT Hardware Requirements

QHR Accuro EMR IT Hardware Requirements QHR Accuro EMR IT Hardware Requirements Hardware Requirements for Accuro EMR Table of Contents Local Install Platform:... 3 Server Requirements:... 3 Workstation Requirements:... 4 Peripheral Requirements:...

More information

Hardware/Software Requirements For Self-Hosting Multi Server

Hardware/Software Requirements For Self-Hosting Multi Server Hardware/Software Requirements For Self-Hosting Multi Server Ebix recommends two or more servers for sites with more than 20 active users. The first step is deciding which type of configuration would best

More information

ivos Technical Requirements V06112014 For Current Clients as of June 2014

ivos Technical Requirements V06112014 For Current Clients as of June 2014 ivos Technical Requirements V06112014 For Current Clients as of June 2014 The recommended minimum hardware and software specifications for ivos version 4.2 and higher are described below. Other configurations

More information

City of Oak Creek. Class Title: Emergency Services Dispatcher. Division: Administrative Location: Police Station

City of Oak Creek. Class Title: Emergency Services Dispatcher. Division: Administrative Location: Police Station City of Oak Creek Class Title: Emergency Services Dispatcher Department: Police Division: Administrative Location: Police Station Job Code Number: Grade Number: Non-Union Summary Description Performs a

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3

More information

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME HELPING LAW ENFORCEMENT AGENCIES SOLVE CRIMES FASTER, WITH LOWER COSTS AND FEWER RESOURCES. 1 Wynyard Group Advanced Crime

More information

PROGRAMME "PREVENTION OF AND FIGHT AGAINST CRIME" 2007-2013 CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS

PROGRAMME PREVENTION OF AND FIGHT AGAINST CRIME 2007-2013 CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS PROGRAMME "PREVENTION OF AND FIGHT AGAINST CRIME" 2007-2013 CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS Action Grants 2012 within the Framework Partnership Agreements Deadline 1: 10 August

More information

CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION. Semester Hours Credit: 3

CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION. Semester Hours Credit: 3 CENTRAL TEXAS COLLEGE SYLLABUS FOR CRIJ 2314 CRIMINAL INVESTIGATION INSTRUCTOR: OFFICE HOURS: Semester Hours Credit: 3 I. Introduction A. This course covers the fundamentals of criminal investigations

More information

Thomson Reuters CLEAR THE SMARTER WAY TO GET YOUR INVESTIGATIVE FACTS STRAIGHT.

Thomson Reuters CLEAR THE SMARTER WAY TO GET YOUR INVESTIGATIVE FACTS STRAIGHT. Thomson Reuters CLEAR THE SMARTER WAY TO GET YOUR INVESTIGATIVE FACTS STRAIGHT. CLEAR. EASIER SEARCH. BETTER RESULTS. SMARTER PREFERENCES. Bring the facts into focus. CLEAR features a simple, intuitive

More information

Cyber Security Response to Physical Security Breaches

Cyber Security Response to Physical Security Breaches Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically

More information

Response Checklist. Key issues to consider:

Response Checklist. Key issues to consider: Response Checklist During the response phase, which occurs immediately after an incident, law enforcement officials, first responders, victim service providers, and others will manage, coordinate, and

More information

Phillip Kruss Chief, Information Technology Service

Phillip Kruss Chief, Information Technology Service The gocase application is UNODC s Case Management System for Member States Law Enforcement and Regulatory Agencies & Criminal Intelligence and Prosecutorial Services gocase.unodc.org UNODC s Information

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

The Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations. State of Maryland.

The Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations. State of Maryland. The Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations State of Maryland June 1, 2011 1 Section B. The Criminal Justice Dashboard (Dashboard) is

More information

Installation Process

Installation Process Installation Process Aivika One Lite New Dynamic Solutions BVBA Contents Contents... 2 Introduction... 3 Aivika One Lite introduction... 4 Concept... 4 Components... 4 Deploying Aivika One Lite... 5 Supported

More information

Web Server (IIS) Requirements

Web Server (IIS) Requirements Web Server (IIS) Requirements Important! The Web Server (IIS) cannot be the primary or backup domain controller. Operating System Windows Server 2012 R2 Windows Server 2008 R2 (64-bit with IIS running

More information

JOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015

JOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015 `STATE OF OHIO (DAS) CLASSIFICATION SPECIFICATION SERIES PURPOSE CLASSIFICATION SERIES Medicaid Special Agent MAJOR AGENCIES Attorney General Only SERIES NUMBER 2614AG EFFECTIVE 11/15/2015 The purpose

More information

securityserver Unparalleled management and detection of security, environmental, and disaster control resources.

securityserver Unparalleled management and detection of security, environmental, and disaster control resources. securityserver Unparalleled management and detection of security, environmental, and disaster control resources. Map cameras & sensors in server rooms or buildings in cities AKCP securityserver puts you

More information

Europol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011

Europol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011 Europol Cybercrime Centre The perspective of Europol on Cybercrime Courmayeur Mont Blanc, Italy, 2-4 December 2011 The Threat The threat from cybercrime is multi-dimensional, targeting citizens, businesses,

More information

Agency Operations Plan 2015-17

Agency Operations Plan 2015-17 Agency Operations Plan 2015-17 Agency: ND Insurance Department Line of Business: (optional) Contact: Name: Laurie Scully Title: Computer & Network Specialist II Phone #: 701.328.2503 Email: lscully@nd.gov

More information

case asset management database software electronic case notes

case asset management database software electronic case notes case asset management powerful security configurable data forms comparative analysis case asset management database software electronic case notes messaging configurable reports LIMS integration www.mideosystems.com

More information

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

THREAT VISIBILITY & VULNERABILITY ASSESSMENT THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings

More information

Avira Secure Backup INSTALLATION GUIDE. HowTo

Avira Secure Backup INSTALLATION GUIDE. HowTo Avira Secure Backup INSTALLATION GUIDE HowTo Table of contents 1. Introduction... 3 2. System Requirements... 3 2.1 Windows...3 2.2 Mac...4 2.3 ios (iphone, ipad and ipod touch)...4 3. Avira Secure Backup

More information

CLASS SPECIFICATION Systems Support Analyst I

CLASS SPECIFICATION Systems Support Analyst I San Diego Unified Port District Class Code: B837-UE03 CLASS SPECIFICATION Systems Support Analyst I FLSA Status: EEOC Job Category: Classified: Union Representation: Exempt Professionals No Unrepresented

More information

Installation Instructions

Installation Instructions Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand

More information

PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.

PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES. Brightcore Consulting Moodle Hosting Service Agreement Last Revised: September 30, 2013 PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.

More information

To do Justice, as no one is above the Law nor beneath its protection.

To do Justice, as no one is above the Law nor beneath its protection. Michael L. Ramsey, District Attorney District Attorney Department Summary Mission Statement To do Justice, as no one is above the Law nor beneath its protection. Department Description and Key Issues The

More information

Electronic Case Files System User s Manual

Electronic Case Files System User s Manual Getting Started Introduction Electronic Case Files System User s Manual This manual provides instructions on how to use the Electronic Filing System to file documents with the Bankruptcy Court, or to view

More information

Going Paperless. An approach for Housing Authorities

Going Paperless. An approach for Housing Authorities Going Paperless An approach for Housing Authorities Going Paperless Scott Gleason, President Management Computer Service, Inc. Going Paperless An approach for Housing Authorities Going Paperless Why Go

More information

WEST VIRGINIA STATE POLICE LEGAL SERVICES

WEST VIRGINIA STATE POLICE LEGAL SERVICES WEST VIRGINIA STATE POLICE LEGAL SERVICES 2011 Legislative Update Laws Passed that Affect Law Enforcement The following information represents both synopsis and full-text of laws passed during the 2011

More information

10128/16 LB/dk 1 DGD 1C

10128/16 LB/dk 1 DGD 1C Council of the European Union Brussels, 13 June 2016 (OR. en) 10128/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 8770/16, 8819/16 Subject:

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Attach receipt options:

Attach receipt options: Attaching Receipts and Receipt Store There are a few ways to attach receipts to an expense report. You will only need to choose one of the following options when attaching receipts. You can add receipts

More information

How to Use This Manual

How to Use This Manual Your Guide How to Use This Manual 1. Experience basic operations of Rack2-Filer Smart Let's Try (Page 8) 2. Learn useful functions of Rack2-Filer Smart Let's Learn More (Page 24) For the terms and abbreviations

More information

Proposal: Illinois Justice Network Portal

Proposal: Illinois Justice Network Portal Proposal: Illinois Justice Network Portal Summary This proposal addresses the strategic issues that have been identified as being crucial to criminal justice information sharing and recommends the establishment

More information

Page 1 of 6 Position Code #P10213. REPORTS TO: IT Director BRANCH: Information & Technology. ASSOCIATION: Civilian LOCATION: Headquarters

Page 1 of 6 Position Code #P10213. REPORTS TO: IT Director BRANCH: Information & Technology. ASSOCIATION: Civilian LOCATION: Headquarters Page 1 of 6 Position Code #P10213 POSITION TITLE: PRIDE Help Desk Analyst DEPT/DIV.: Support Services REPORTS TO: IT Director BRANCH: Information & Technology ASSOCIATION: Civilian LOCATION: Headquarters

More information

Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x)

Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x) Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x) Start your Internet Explorer browser and direct it to the faculty home page. Click on the link Remote Access,

More information

Crime Mapping and Analysis Using GIS

Crime Mapping and Analysis Using GIS Crime Mapping and Analysis Using GIS C.P. JOHNSON Geomatics Group, C-DAC, Pune University Campus, Pune 411007 johnson@cdac.ernet.in 1. Introduction The traditional and age-old system of intelligence and

More information

Appendix A: Encrypting a File and / or Email Message

Appendix A: Encrypting a File and / or Email Message Appendix A: Encrypting a File and / or Email Message Encryption is defined as the conversion of something to code or symbols so that its contents cannot be understood if intercepted. USDB has approved

More information

For purposes of this policy, the following terms will be defined as follows.

For purposes of this policy, the following terms will be defined as follows. DOMESTIC VIOLENCE AND THE WORKPLACE POLICY STATEMENT The City University of New York ( CUNY ) disapproves of violence against women, men, or children in any form, whether as an act of workplace violence

More information

https://login.microsoftonline.com

https://login.microsoftonline.com MICROSOFT OFFICE 365 PRO PLUS Through an EES agreement that is maintained with Microsoft, Calumet College of St. Joseph is able to provide Microsoft Office 365 Pro Plus for currently active students, faculty

More information

Definitions For purposes of this policy, the following terms will be defined as follows.

Definitions For purposes of this policy, the following terms will be defined as follows. The College at Brockport State University of New York Policy Title: Domestic Violence in the Workplace Policy Category: Human Resources Responsible Office: Human Resources Date: Revised December 2013 Domestic

More information

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal

More information

Remote Access Details

Remote Access Details Practice Name: Hardware Supplier and Support Organisation Name: Contact Name: This document contains important information regarding the configuration and ongoing use of your hardware and software. It

More information

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Information Technology Audit & Forensic Techniques. CMA Amit Kumar Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques

More information

MSOW. MSO for the Web MSONet Workstation Configuration Guide

MSOW. MSO for the Web MSONet Workstation Configuration Guide MSOW MSO for the Web MSONet Workstation Configuration Guide For personal and public computer users accessing MSOW Practitioner Home Page (PHP) and Primary Source Verification (PSV) Updated June 4, 2013

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Amcrest 960H DVR Quick Start Guide

Amcrest 960H DVR Quick Start Guide Amcrest 960H DVR Quick Start Guide Welcome Thank you for purchasing our Amcrest 960H DVR! This quick start guide will help you become familiar with our DVR in a very short time. Before installation and

More information

MCOLES Information and Tracking Network. Security Policy. Version 2.0

MCOLES Information and Tracking Network. Security Policy. Version 2.0 MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section Transnational Challenges and Approaches to Investigating Trafficking Offences Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section Trafficking in persons: a low risk / high profit crime

More information

How To Explain Your Criminal History In Florida

How To Explain Your Criminal History In Florida KNOW YOUR RECORD What Teens Should Know About Their Delinquency Record Law Office of Julianne M. Holt Public Defender, Thirteenth Judicial Circuit of Florida 700 East Twiggs Street, Fifth Floor P.O. Box

More information

How To Get Help In Alaska

How To Get Help In Alaska Information For Victims of Domestic Violence If you are a victim of domestic violence, and the police respond to assist you, they are required by law to read certain portions of this "booklet to you. An

More information

School of Human Services San Diego Campus 2011 Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act Report Emergencies:

School of Human Services San Diego Campus 2011 Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act Report Emergencies: School of Human Services San Diego Campus 2011 Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act Report (known as the Clery Report) Emergencies: Dial [(619) 582 4002] ([911

More information

case image management database software electronic case notes

case image management database software electronic case notes case management powerful security configurable field sets comparative analysis ACE-V documentation case image management database software electronic case notes messaging configurable reports LIMS integration

More information

HOW TO OBTAIN AND POST AN IMMIGRATION BOND: A Guide for Non-Citizens in Detention

HOW TO OBTAIN AND POST AN IMMIGRATION BOND: A Guide for Non-Citizens in Detention HOW TO OBTAIN AND POST AN IMMIGRATION BOND: A Guide for Non-Citizens in Detention January 2011 1 AM I ELIGIBLE FOR A BOND? Figuring out whether or not you are eligible for a bond is a very complicated

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

MedInformatix System Requirements

MedInformatix System Requirements MedInformatix System Requirements Acentec, Inc. A MedInformatix installation requires a workstation for each user who will access the system and a central server to store and process the data. A large

More information

fi-7160/ fi-7260/ fi-7180/ fi-7280 Getting Started Image Scanner Checking the Components P3PC-4252-01EN

fi-7160/ fi-7260/ fi-7180/ fi-7280 Getting Started Image Scanner Checking the Components P3PC-4252-01EN P3PC-4252-01EN fi-7160/ fi-7260/ fi-7180/ fi-7280 Getting Started Image Scanner Thank you for purchasing the fi-7160/fi-7260/fi-7180/fi-7280 color image scanner. This manual describes the preparation required

More information

Windows XP is no longer supported by Microsoft, effectively making it noncompliant

Windows XP is no longer supported by Microsoft, effectively making it noncompliant System Requirements This page has been formulated for the sole purpose of general specifications only and is NOT to be used as a final hardware consultation. Please consult with the ChiroTouch sales and/or

More information

As part of their course on law and/or sociology in this module, participants will be able to:

As part of their course on law and/or sociology in this module, participants will be able to: Correctional Service Service correctionnel Service correctionnel Correctional Service Law Correctional Service : At the Heart of Criminal Justice Description The Correctional Service of : At the Heart

More information

Getting Started. Image Scanner. Checking the Components P3PC-3362-02EN

Getting Started. Image Scanner. Checking the Components P3PC-3362-02EN P3PC-3362-02EN Getting Started Image Scanner Thank you for purchasing the fi-6130z/fi-6230z/fi-6140z/fi-6240z color image scanner. This manual describes the preparation required to use this product. Follow

More information

A Workflow for Patient Electronic Signatures and Document Storage

A Workflow for Patient Electronic Signatures and Document Storage A Workflow for Patient Electronic Signatures and Document Storage Presented by: Margery Beck System Analyst Jennifer Boldin Application Support Analyst MIMA: Independent 125-provider multi-specialty group

More information

White Paper Automated Digital Evidence Collection and Publishing: Reduce Investigation Time and Costs May 2011

White Paper Automated Digital Evidence Collection and Publishing: Reduce Investigation Time and Costs May 2011 White Paper Automated Digital Evidence Collection and Publishing: Reduce Investigation Time and Costs May 2011 FBI 2009 Report: 1,756 terabytes of data processed 58,609 pieces of digital media 21,810 CDs

More information

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if

More information

Linux and Law Enforcement

Linux and Law Enforcement Linux and Law Enforcement Challenges and Opportunities Dr. Joshua I. James Digital Forensic Investigation Research Laboratory SoonChunHyang University Joshua@cybercrimetech.com http://forensics.sch.ac.kr

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information