Police Technology Chapter Eight

Slides:



Advertisements
Similar presentations
Illinois Justice Network Portal Implementation Board Meeting February 11, 2004.
Advertisements

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Seven Police Technology Communications Dispatch.
Hart District Acceptable Use Policy Acceptable Use Policy.
Confidentiality and HIPAA
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Eleven Police Technology Information Exchange.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fifteen Police Technology Tracking and Surveillance.
2 Language of Computer Crime Investigation
Fingerprinting Continued...
Legislation in ICT.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Five Police Technology Geographic Information.
Section II: Law Enforcement
PMI Inventory Tracker™
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Twenty-One Police Technology Emergingand.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
Data Protection Act. Lesson Objectives To understand the data protection act.
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Chapter 3: THE CRIME SCENE “ Oh, how simple it would all have been had I been here before they came like a herd of buffalo and wallowed all over it.” —A.
Management Information Systems
What’s in it for Me?. Recognition Program The Recognition Program requires extra work on the part of a Department. Why do we need to do it???
Anonymity, Security, Privacy and Civil Liberties
INTRODUCTION TO FORENSICS Science, Technology, & Society MR. CANOVA PERIOD 11.
Copyright :Hi Tech Criminal Justice, Raymond E. Foster Law Enforcement Criminal Investigations Part II.
Sunshine Center of the N.C. Open Government Coalition Feb. 27, 2015 NORTH CAROLINA SUNSHINE LAWS & GIS.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART B SEEKING AND OBTAINING INFORMATION: PEOPLE AND RECORDS Criminal Investigation:
Emergency Response to Environmental Accidents Paul M. Schmidt, Esq.
Mobile Audio/Video Recording Equipment Policy and Procedure Number PP
Information Systems Security Operational Control for Information Security.
Computer Forensics Principles and Practices
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
12015/10/20 Muhammad Salman University of Indonesia.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Crime Scene Investigator Occupation PowerPoint Created by The University of North Texas in partnership with the Texas Education Agency.
The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.
3.2 Notes Crime Scene Reconstruction, Forensic Databases.
Chapter 2 Securing Network Server and User Workstations.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
1 California State University, Fullerton Chapter 3 Information System Fundamentals.
Implementing TraCS In Georgia 29 th Int’l Traffic Records Forum July 16, 2003 Presented by Bill Youngblood State Traffic Records Coordinator.
Information Systems Unit 3.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Crime Analysis and Mapping Jonathan Lewin. Impacting Crime Considerations in Developing a Crime Mapping Application.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Workshop 4 Tutor: William Yeoh School of Computer and Information Science Secure and High Integrity System (INFT 3002)
Legal and Ethical Issues in Computer Security Csilla Farkas
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
CITY OF PHOENIX RECORDS MANAGEMENT AND E-PRIVACY Margie Pleggenkuhle City Clerk Department March 18, 2004.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Add video notes to lecture
Chapter 3 First Response.
Legal Liability.
Domain 2 – Asset Security
Chapter 1: Policing in America
Computers in the Ambulatory Care Setting
Good Spirit School Division
15-5 Automated Fingerprint Identification System
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Police Technology Chapter Eight Agency Systems Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Learning Objectives The reasons good record keeping is critical to law enforcement Operator security (right to know and need to know). Purpose of Record Management Systems (RMS), Jail Management Systems (JMS) and Evidence Management Systems (EMS) Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Learning Objectives Impact of Freedom of Information Act (FOIA) on police records Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Police Records Information retained By police agencies runs the spectrum from crime reports to Personnel records. Information needs to be: Readily available Kept for a long time Held confidentially Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Record Keeping Systems Police agencies create a lot of paper – automated record keeping systems are a combination of hardware, software, policy and procedure Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Record Keeping Systems First tier manufacturers are large companies. They are set up to product quality custom-designed software and hardware configurations. Second tier manufacturers may be large companies, but the products are off-the-shelf, not custom-designed. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Record Keeping Systems The result is: Many of these systems are incompatible Smaller agencies do not gain the expertise that the larger agencies have Fragmentation and its resulting effects continues to grow Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Criminal Justice vs. Police Records Includes every piece of info gathered in and used by the criminal justice system. A fully integrated police records management system is going to have access to all of the other records maintained by different criminal justice organizations. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

A few of the sources of information Commercial Records NCIC Other Agencies Probation Records Vehicle Records Police Officer Prison Records Court Records Local Agency Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Both Input and Output Commercial Records NCIC Other Agencies Probation Records Vehicle Records Police Officer Prison Records Court Records Local Agency Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Information Security and Accuracy In law law enforcement, when information is compromised, authorized users primarily do it intentionally. In other words, most security breaches are as a result of intentional acts, not hackers, etc. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Information Security and Accuracy law enforcement personnel also have general access to a wide variety of information about the average person that is confidential and protected by law. Generally, information available to law enforcement users is considered privileged information (for official use only) Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Right to know vs. Need to know Derived from the officer’s occupation. Police officers have a right to know certain privileged information. Derived from the situation. Does the officer need to know this information in order to further his/her criminal investigation? Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

First layer of protection . . . Training people to realize their ethical responsibilities with confidential information. Having clear rules and regulations concerning the field use of equipment Using passwords Data logs Different levels of access Authentication Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Privacy Issues For example, the names of victims sexual assault. Failure to protect the victims’ privacy can result in civil litigation. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

For Law Enforcement Agencies: Information about someone can be considered their personal property Victims trust the agency will not reveal the information If the information is reveals, it could cause the person to suffer (e.g., defamation) Using a person’s likeness (photo) raises issues of ownership Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

To Balance Public Confidence The times in which law enforcement agencies are prevented from intercepting communications by private citizens Fulfill a citizen’s demand to know what information the government has obtained [Freedom of Information Act FOIA)] Government take affirmative acts to inform people of information. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Turning Data into Information Indexing Master file with cross-referenced numbers Now done with databases. Evolved into. . . Relational databases Foundation of Records Management Systems (RMS) Can be link to external sources of information Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Record Management System Several smaller systems (like CAD and GIS) That exchange information with a master server You may only ask questions of a specific database within an agency Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Jail Management System Information containing: Inmates status Photographs Fingerprints Visitations Special needs Medical information Security information – like gang affiliation Screen capture provided by Crimestar, Inc. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Evidence Management Systems Documents chain of custody Assists in orderly transfer of evidence to labs and courts Assists in the proper storage of evidence Screen capture provided by Crimestar, Inc. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Case Management Systems Assists detectives and detective supervisors in the assignment of cases and coordinating investigations Screen capture provided by Crimestar, Inc. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Many different uses of police data Screen captures provided by Crimestar, Inc. Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Many different uses of police data Strategic Purposes: Deployment Crime Analysis Two types of inquiries: Conditional Ad Hoc query Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

New mobile office systems The mobile Office consists of: Vehicle Mobile Radio System Mobile Data Computer (laptop in vehicle) Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

New mobile office systems Allow officers to access: Mugshots Fingerprints GIS maps Aerial Photographs Challenges: Bandwidth Photograph provided by Woodcrest Vehicles Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

New mobile office systems Like a desk top PC, the Mobile Office has a computer CPU, usually mounted in the truck Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Image Processing Documents Photographs Fingerprints Crime Scene photographs Can be: Scanned Digitized Stored in a database Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster

Explore Police Books at www.police-writers.com Police Technology Explore Police Books at www.police-writers.com Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster