24 Octobre 2008ICT4JUSTICE1 Electronic Court Management System Litigation Document Management Platform.

Slides:



Advertisements
Similar presentations
1/17/20141 Leveraging Cloudbursting To Drive Down IT Costs Eric Burgener Senior Vice President, Product Marketing March 9, 2010.
Advertisements

CourtFLOW The Continuing Evolution of Court Reporting The Continuing Evolution of Court Reporting A V Innovations Inc.
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Chapter 10 Site Architecture McGraw-Hill/Irwin Copyright © 2004 by The McGraw-Hill Companies, Inc. All rights reserved.
8.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
2 Object-Oriented Analysis and Design with the Unified Process Objectives  Describe the differences between requirements activities and design activities.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
1 Introduction The Database Environment. 2 Web Links Google General Database Search Database News Access Forums Google Database Books O’Reilly Books Oracle.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Chapter 2 Client Server Architecture
Remote Networking Architectures
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Open Cloud Sunil Kumar Balaganchi Thammaiah Internet and Web Systems 2, Spring 2012 Department of Computer Science University of Massachusetts Lowell.
Plan Introduction What is Cloud Computing?
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
CPMT 1449 Computer Networking Technology – Lesson 1
“Ordinary People Doing Extraordinary Work” Panoramic Group of companies is a diversified Indian multinational conglomerate, engaged in the business of.
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
The Internetworked E-Business Enterprise
Building E-Commerce Applications and Infrastructure.
Moving to Design.
Application and Usage of Cloud Computing and Data Security
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Quality Attributes of Web Software Applications – Jeff Offutt By Julia Erdman SE 510 October 8, 2003.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
BUSINESS DRIVEN TECHNOLOGY Chapter Sixteen: Integrating Collaborative Partnerships.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
1 YOUNGSTOWN STATE UNIVERSITY Information Technology Tools for Engineers Groupware and Collaboration tools Group 5 YOUNGSTOWN STATE UNIVERSITY Information.
SharePoint Portal Server Office XP Launch Tour Breakout Presentation nametitle Microsoft Corporation.
Computers Are Your Future Eleventh Edition
9 Systems Analysis and Design in a Changing World, Fourth Edition.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Chapter 4 Intranets and Extranets. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning.
Web Design and Development for E-Business By Jensen J. Zhao Copyright 2003 Prentice Hall, Inc. Web Design and Development for E-Business Jensen J. Zhao.
Communications & Networks National 4 & 5 Computing Science.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Microsoft Partner Conference Integrated Innovation Don Kerr Partner Technology Specialist.
Title in Sergoe, white, shadow, 36 Presentation title goes here, using Segoe Regular, in sentence case. Integrated Innovation Mark O’Shea Partner Technology.
Office 365 What Is The Right Fit For You? Andrew Riley, MCTS, MCTIP, ITIL v3.
INTRODUCTION TO COMPUTER NETWORKS BY: SAIKUMAR III MSCS, Nalanda College.
Unit 3 Virtualization.
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Chapter 12: Architecture
Contents Software components All users in one location:
CIIT-Human Computer Interaction-CSC456-Fall-2015-Mr
Principles of Network Applications
Chapter 18 MobileApp Design
VPN (Virtual Private Network)
Introduction to Networks
Introduction to Networks
Introduction to Networks
Goals Introduce the Windows Server 2003 family of operating systems
Introduction to Databases Transparencies
Chapter 12: Physical Architecture Layer Design
Enterprise Program Management Office
Web Application Server 2001/3/27 Kang, Seungwoo. Web Application Server A class of middleware Speeding application development Strategic platform for.
The Database Environment
Introduction to Networks
Designing IIS Security (IIS – Internet Information Service)
Introduction to Networks
Client/Server And Peer-to-Peer
Providing Teleworker Services
Presentation transcript:

24 Octobre 2008ICT4JUSTICE1 Electronic Court Management System Litigation Document Management Platform

24 Octobre 2008ICT4JUSTICE2 E-Court System In 2006 the UN ICTY introduced an electronic Court Management system (Litigation document management platform) to handles all aspects of electronic evidence discovery and presentation in the Court.

24 Octobre 2008ICT4JUSTICE3 System Characteristics Web-based technology that handles all aspects of electronic evidence discovery and presentation helping the ICTY the Registry, litigation support professionals and IT managers manage hundreds of cases and thousands of documents. Scalable technology easy to deploy, configure and modify Multi-tiered security ensures that case files and data are accessible only by authorized parties

24 Octobre 2008ICT4JUSTICE4 System Architecture Local Client Remote Web Client VPN Security server Web Server E-Court Server Transcript Server Internet

24 Octobre 2008ICT4JUSTICE5 Network Architecture

24 Octobre 2008ICT4JUSTICE6 Courtrooms Hardware Architecture

24 Octobre 2008ICT4JUSTICE7 Remote Testimony Secure point to point remote witness testimony from our field offices through satellite links Dedicated hardware encrypters and satellite modems on both ends

24 Octobre 2008ICT4JUSTICE8 ISDN Remote testimony ISDN point to point remote witness testimony Encrypted and non encrypted video conferencing and testimony.

24 Octobre 2008ICT4JUSTICE9 E-Court Case live cycle Identify Documents Organized logically by source Image Load to the E-Court System Ongoing Analysis Analysis Issues Lists Chronologies Notes Transcripts Collaboration Sharing Data Calendar News Groups Productions TRIAL Presentation of evidence and admitting exhibits

24 Octobre 2008ICT4JUSTICE10 E-Court Documents Currently ICTY uses 4 types of documents: Prosecution documents Defence Documents InCourt Documents Temporary Documents

24 Octobre 2008ICT4JUSTICE11 Document Access The access to documents is very flexible and can be done using: Level Access (Folders on the filesystem) List Access (Logical Folders) Search Access/Saved Search Access Issue Access/Notes/Chronologies

24 Octobre 2008ICT4JUSTICE12 E-Court Advantage (I) Flexible and easy access to trial materials Flexible configuration of cases and access layers Effective presentation of evidence inside the courtrooms Easy dissemination of voluminous Trial info

24 Octobre 2008ICT4JUSTICE13 E-Court Advantage (II) Annotation of Transcripts Real time exhibits annotations Quick access to information using advanced search and Reports Remote Access to Trial material High level of security

24 Octobre 2008ICT4JUSTICE14 E-Court Disadvantage Culture change for judges/lawyers to work in an electronic environment Complex software to manage and maintain Complex hardware infrastructure that require professional IT personnel High cost of software, Hardware and maintenance