1 law enforcement national data exchange search annual membership group meeting july 20, 2007

18
1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

Upload: rigoberto-gapp

Post on 01-Apr-2015

215 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

1

Law EnforcementNational Data Exchange

SEARCH Annual Membership Group MeetingJuly 20, 2007

Page 2: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

2

Development Schedule

Increment 1: 1st Quarter, 2008

Increment 2: 1st Quarter, 2009

Increment 3: 1st Quarter, 2010

1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4

FY 07 FY 08 FY 09 FY 10

Increment I - Initial Deployment

*Sharing of Incident/Case Report Information *Search * Correlation (Basic) * Visualization (Basic)

* Limited Fail - Over Capability* Initial Support 50,000

Increment II - Initial Deployment

* Increasing System Fail-Over Capabilities * Add Data Sets Incarceration Data and Arrest Booking Data * Correlation (Advanced) * Visualization (Advanced) * Subscription/Notif ication (Advanced) * Analytical/Reporting (Basic) * 100,000 Users

Increment I - O & M

Increment III - FOC

* Implement Fully Redundant System and Environments * Add Data Sets- Probation/Parole Data * Enhancements and Modif ications Previously Deployed * Analytical Reporting (Advanced) * Rolled out Nationally to participants * 200,000 Users

Increment II O & M

O & M

Anticipated Dates

Page 3: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

3

Development and Implementation

Performance-Based Acquisition Development contract awarded to Raytheon Company,

February 12, 2007 Contractor start date – February 26, 2007

Incremental Deployment Increment I – February 2008

Sharing of incident/case report information Search Correlation (basic) Visualization (basic) Limited fail-over capability Initial support – 50,000 users

Page 4: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

4

Development and Implementation, cont.

Increment II – February 2009 Add data sets – incarceration data and

arrest/booking data Correlation (advanced) Visualization (advanced) Subscription/Notification (advanced) Analytical/Reporting (basic) Increasing system fail-over capabilities 100,000 Users

Page 5: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

5

Development and Implementation, cont.

Increment III – February 2010 Add data sets – probation/parole data Enhancements and modifications to previously

deployed functionality Analytical reporting (advanced) Implement fully redundant system and

environments 200,000 Users

Operations and Maintenance Delivery – September 2010

Page 6: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

6

Major Activities, Milestones, and Reviews for Increment 1

System Test Readiness Review (STRR) (CONTROL GATE 5)

Prototyping

Requirements & Architecture

Detailed Design

Design Concept Review (DCR)

Critical Design Review (CDR)

Component Development, Test & Integration

Production Test Readiness Review (PTRR)

Deployment Readiness Review (DRR) (CONTROL GATE 4)

Functional & Interface Testing

Deploy to CJIS

System Test

Acceptance Test

Acceptance Test Readiness Review (ATRR)

Operational Readiness Review (ORR)

Final Design Review (CONTROL GATE 3)

Development and Test

Implementation and Integration

Operations and Maintenance Operations and Maintenance

Jul 26

Aug 29

Oct 4

Oct 26

Nov 13

Mar 15

May 8

May 30

Feb 2008

Operational Acceptance Review (OAR) (CONTROL GATE 6)

Training, C&A, Deployment

Integrated Baseline Review (IBR)

May 2

Program Management

Week 21

Week 26

Week 31

Week 34

Week 8

Week 4

Week 10

Week 13

Page 7: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

7

N-DEx Data Sensitivity Levels

The entering agency categorizes data submitted to the System into levels of sensitivity upon which the dissemination of the information/data is controlled.

APB Approved Sensitivity Levels:

- This capability will allow agencies to submit information for sharing but control the dissemination of sensitive information to protect investigative equities.- Sensitivity applied to specific data elements if needed

LEVEL 1 - SHAREDN-DEx shall provide the capability for data contributors to allow sharing data it submits to N-DEx

LEVEL 2 – CONDITIONALLY SHAREDN-DEx shall provide the capability for data contributors to specify “pointer based” sharing of data. (i.e. provide POC information only)

LEVEL 3 – NOT SHAREDN-DEx shall provide the capability for data contributors to restrict data its submits to N-DEx. This level is reserved for the most restricted investigations and investigative information.

Page 8: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

8 88

Key Data Sharing Requirements: Increment 1

Allow agency to control how and with whom their data is shared Agencies can enforce sharing restrictions for their data through agency-

administered policy on N-DEx or by tagging data prior to submission to N-DEx.

Accommodate changes to sharing policy N-DEx provides tools and mechanisms to allow each agency policy to

change/select policies, without modifications to N-DEx system Allow data contributors to designate their data as:

Unrestricted sharing (Green) * Pointer-based sharing (Yellow) * Restricted sharing (Red)

* Allows data contributor to specify “exceptions” for red or yellow data (i.e. who can view the red or yellow data)

Page 9: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

9 99

Key Data Sharing Requirements: Increment 1 (cont.)

Allow data contributors to grant access to pointer-based (yellow) and restricted (red) data to selected users, groups, or agencies

N-DEx provides tools for fine-grained access control, e.g., to certain individuals or groups/task forces

Allow data contributors to configure sharing rules at the record, element/attribute or groups of elements/attributes level

N-DEx provides tools for fine-grained access control, e.g., to certain elements such as victim identifying information

Allow agencies to tag data prior to submission to N-DEx Agencies can restrict sharing at the record level only using this method Agencies can select generally who can view their red or yellow data

using N-DEx User Interface – applies to all red or yellow records Agencies can’t take full advantage of the flexible sharing policies if they

opt to tag their data prior to submission (but can configure N-DEx to ignore their tags and use N-DEx tagging policies at a later time)

Page 10: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

10

Implementation Process

Contributor • Creates and assigns

sharing groups

Contributor • Creates and assigns

sharing groups

During operations, Contributor may

• Modify sharing groups

During operations, Contributor may

• Modify sharing groups

Contributor • Selects subset of rules appropriate for

its data• Creates and assigns sharing groups

Contributor • Selects subset of rules appropriate for

its data• Creates and assigns sharing groups

During operations, Contributor may • Modify sharing groups• Affect (activate/deactivate) sharing

rules• Affect specific records, all records, or

new submissions

During operations, Contributor may • Modify sharing groups• Affect (activate/deactivate) sharing

rules• Affect specific records, all records, or

new submissions

Contributor may migrate from unrestricted data (ALL GREEN) only, or agency-supplied, to N-DEx-assigned tags after coordinating with N-DEx operations staffContributor may migrate from unrestricted data (ALL GREEN) only, or agency-supplied, to N-DEx-assigned tags after coordinating with N-DEx operations staff

N-DEx assigned tagsagency-supplied tags

unrestricted data only

During integration planning, Contributor indicates sharing policy intent:

• Unrestricted data only (ALL GREEN)• Agency-supplied tags• N-DEx assigned tags

During integration planning, Contributor indicates sharing policy intent:

• Unrestricted data only (ALL GREEN)• Agency-supplied tags• N-DEx assigned tags

Page 11: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

11

Granularity of Sharing Policy Sharing policy can apply to

entire records specific elements/attributes within the record, or groups of elements/attributes

If data received pre-tagged, sharing policy must apply to entire record (#’s 1-3 in example)

Incident

Subject

Victim

Witness

1

Incident

Subject

Victim

Witness

2

Incident

Subject

Victim

Witness

3

Incident

Subject

Victim

Witness

6

Incident

Subject

Victim

Witness

4

Incident

Subject

Victim

Witness

5

Name

Address

Phone #

SSN

Witness

Page 12: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

12 12

Sharing Rules, Increment 1

1If incident type is SEX CRIME and person is type VICTIM, personal identifying data is restricted, except for <<as specified by sharing group>>

2If person is of type WITNESS and person attribute AGE IS LESS THAN 18 AT TIME OF EVENT, personal identifying data is restricted, except for <<as specified by sharing group>>

3If person is of type SUBJECT and person attribute AGE IS LESS THAN 18 AT TIME OF EVENT, personal identifying data is restricted, except for <<as specified by sharing group>>

4If person is of type VICTIM and person attribute AGE IS LESS THAN 18 AT TIME OF EVENT, personal identifying data is restricted, except for <<as specified by sharing group>>

5 All Incidents are pointer-based accessed, except for <<as specified by sharing group>>

Note: “personal identifying data” is Name, SSN, Age, and Address

In Increment 1, contributors can select rules from a pre-defined list Candidate rules include:

Page 13: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

13 13

Sharing Rules for “Pre-Tagged” Data If a contributor chooses to submit data pre-tagged

sharing policy specifies who has access to any restricted (RED) or pointer-based (YELLOW) incident reports

01 Incidents tagged as restricted (RED) are visible only to

02 Incidents tagged as pointer-based (YELLOW) are fully visible only to

Apply to New Records

Apply to All Records

Do Not Apply

Contributor Sharing Policies

EAGLE Task Force

My Agency Group

1. When data is tagged prior to submission to N-DEx, the contributor’s sharing policy is at the incident level

2. A contributor must define sharing groups to specify who has unrestricted access to the data

Page 14: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

14

Interfaces – Business Rules

Insert/Replace Based on unique data item id When publish instruction is “Insert” Record does not exist in N-DEx: record is Inserted Record exists in N-DEx: record is Replaced

Delete Based on unique data item id When publish instruction is “Delete” Record exists in N-DEx: record is deleted. Send expungements as a “Delete” Message

Page 15: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

15

Interfaces – Business Rules

Supplements Supplements: two records logically related. The LEA System has two options: Option 1: Represent in N-DEx as two records Option 2: In mapping create one Report with all of the entities of both

records.

When a supplement is created the LEA System must send the original record and all supplements.

Example: For N-DEx purposes a supplement is a record that is related to another record but managed separately by the RMS system. These are commonly seen as records numbered like: 12345 (primary record), 12345.1 (supplement 1 to 12345), 12345.2 (supplement 2 to 12345).

Page 16: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

16

Continued Role of N-DEx SMEs

Raytheon usability prototype and wireframes On-line review and comments Participation over several months as Increment 1 evolves Participation will continue for Increment 2 & 3

Training/Audit Review CBT and Training Guides Review Audit Plan and Guide

Participate in Testing Functional and Interface Testing Acceptance Testing

Cost Modeling Participate in validation of Cost Modeling Study

Page 17: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

17

Role of CJIS Systems Officer (CSO)

The Advisory Policy Board tasked the N-DEx Program Office with conducting an analysis of each state’s role for N-DEx connectivity.

Brief questionnaire sent to all CSOs by N-DEx Program Office during week of June 25, 2007, requesting response by July 16, 2007. The questionnaire focused on the CJIS system responsibilities for each CSO within their respective state in reference to the N-DEx system (i.e. monitoring system usage, system discipline, CJIS operating procedures, and other related duties outlined in the User Agreement).

The N-DEx Program Office will report the findings of the CSO analysis at the Fall CJIS Working Group Meetings scheduled August 15-16, 2007, in Denver Colorado.

Page 18: 1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007

18

Questions

N-DEx Program OfficeCriminal Justice Information Services Division

1000 Custer Hollow RoadClarksburg, WV 26306-0101

(304) [email protected]