Security requirements vary with each site. During customization, Infosys ensures these needs are addressed. For example, there may be certain users that have update rights for some areas and inquiry rights to others. There may be the need to carry security out to the field level. All of this is discussed and configured during the customization phase. Thorough Assault Case Tracking Custom Security Return to Main Menu Database EncryptionUsercodes & Passwords
The following example will search the database for all white female victims between the ages of 10 and 18 where alcohol was involved. We will then show how the results can be printed, exported, and graphed. Again, this type of search can be done for ANY combination of fields in the database. Thorough Assault Case Tracking Statistical Analysis Return to Main MenuContinue
Thorough Assault Case Tracking 1018 Select Criteria for your particular search FemaleWhite
Thorough Assault Case Tracking Return to Main Menu Press the Search button to see results
Thorough Assault Case Tracking Return to Main Menu Press the Print All button to print results
Thorough Assault Case Tracking Return to Main MenuContinue
Thorough Assault Case Tracking Return to Main Menu Press the Export button to export results
Thorough Assault Case Tracking Select the fields to export
Thorough Assault Case Tracking Return to Main Menu Press the > button to include the fields
Thorough Assault Case Tracking Return to Main Menu Press the Export button and…
Thorough Assault Case Tracking Return to Main MenuContinue An Excel file is created with the results of your search, but limiting the output to the fields selected for the export. This information can now be shared without violating any privacy rules. Its quite common for outside agencies to request statistical data from your site. You can now easily create it and the results.
Thorough Assault Case Tracking Return to Main Menu Press the New Graph button to graph results
Thorough Assault Case Tracking Return to Main Menu The graphed results of your search can easily be printed and used for presentations, training, or meetings.
Heres a sample of a client input screen. From here, multiple contacts, services, and disclosures can be tracked. Thorough Assault Case Tracking Detailed Demographics Return to Main Menu ServicesFollow-up Scheduling Forensic InterviewingPrevention/Education Volunteer Management Donations
In order to give you a better opportunity to become familiar with the TACT software, we offer on-line demonstrations. These sessions allow you and your staff to view a working model of the TACT program at your office and ask in-depth questions to be sure the software will meet your needs. The online demonstrations usually take about an hour (depending on the number of people and questions), requires a high-speed internet connection and a speaker phone. Please contact our office for scheduling. Thorough Assault Case Tracking On-Line Demonstrations Return to Main MenuContact Us