cms project report - kane county, illinois...cms project report 5/3/2016. 5/3/2016. 5/3/2016 project...

23
CMS Project Report 5/3/2016

Upload: others

Post on 30-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

  • CMS Project Report

    5/3/2016

  • 5/3/2016

  • 5/3/2016

    Project Scope: Implementation of Odyssey to provide the County with a fully integrated group of products centered on a court/case management system that provides functionality for the Circuit Court Clerk, State’s Attorney, Public Defender, and the Judiciary through the following licensed products: Odyssey Case Manager Enterprise – All Case Types, Odyssey Financial Manager, Odyssey Attorney Manager – Enterprise – Public Defender and Prosecutor, SessionWorks Judge Edition, SessionWorks Clerk Edition, eSignature, Odyssey Portal – Secure Public Access, Enterprise Document Management System, Integration Toolkit, Enterprise Custom Reporting, Record on Appeals Creator, Enterprise OMS (Batch/Workflow), ePayments, and Odyssey File and Serve – Total Cost: $4,069,280

    Scope Changes: June 2015: Token Training - $11,600Aug 2015: Development Items per FIT - $82,335Aug 2015: Additional Modules – OCR Level 3 and eNotify - $89,194Dec 2015: State’s Attorney Data Conversion - $147,200Dec 2015: Development Items per FIT - $344,420Total Cost: $674,749

    Total Project Cost: $4,744,029

  • Timeline - Schedule3Q2014 4Q2014 1Q2015 2Q2015 3Q2015 4Q2015 1Q2016 2Q2016 3Q2016

    Project Kickoff

    FIT Analysis

    Business Process Review

    Configuration

    Development

    Data Conversion

    Go Live

    Training

    Complete

    Planned Actual

    4/20/2016

    5/3/2016

    Complete

    Complete

    Complete

    Sheet1

    3Q20144Q20141Q20152Q20153Q20154Q20151Q20162Q20163Q2016

    Project Kickoff

    FIT Analysis

    Business Process Review

    Configuration

    Development

    Data Conversion

    Go Live

    Training

    Sheet2

    Sheet3

  • Project Update• Recent activities

    – Data Conversion Push 3 for Circuit Clerk– Data Conversion Push 1 for State’s Attorney– 5 development items delivered to Circuit Clerk– 23 scheduled– Training plan being developed– Preparation for deployment of development,

    production, and portal environments• Risks

    – State Reporting– Testing

    5/3/2016

  • 5/3/2016

    Fiscal Year to Date Report

  • 5/3/2016

  • 5/3/2016

    Life to Date Report

  • 5/3/2016

  • 5/3/2016

    Tyler Electronic Court – Short Version – 7 minutes:http://www.viddler.com/v/8d93eb5a?secret=49183893

    Tyler Electronic Court demonstration follow this link: http://www.viddler.com/v/42a148bc?secret=97220433

    http://www.viddler.com/v/8d93eb5a?secret=49183893http://www.viddler.com/v/42a148bc?secret=97220433

  • eCitation Overview• Definition:

    – eCitation software was developed to allow law enforcement (LE) officers the ability to quickly enter and validate citation information from a mobile data computer in their patrol car. The software will also provide a means to import the data into the LE Record Management Systems and the Court Management Systems. This will help eliminate the current requirement to manually enter the data.

    • Purpose: – Implement a NEW eCitation

    environment which will automate processing of citations for County Law Enforcement and the Circuit Clerk

    • Benefits:– Cost Avoidance

    • Help eliminate the need to manually enter each ticket 3 times on about 83K citations a year (249K entries)

    – Officer– Agency– Circuit Clerk

    – Scalability• The County can grow citation

    issuance without adding staff– Typically about 20%-30% increase

    in citations after implementation– More Accurate Data

    • Eliminate human input errors– High Degree of Integration

    • With New World• With Tyler Odyssey

    – Stability• 99.9% SLA on availability

  • Evaluation ResultsScore SummaryEvaluation Criteria APS/Trimble digiTicket/Saltus Tyler/BrazosKey Specifications - Minimal System(s) Requirements - Technical Components, Integration and Implementation - Physical and Information Security 9.56% 17.30% 19.22%Respondent Profile and Executive Summary - Vendor Viability - Kane County Experiences with Responder - Client References - Performance history, including, without limitation, competency, responsiveness, cost control, work quality and the ability to meet schedules and deadlines 5.33% 17.63% 16.70%Desired System Functionality - Functionality - Training, Documentation, and Associated Support Services - Upgrades, and Maintenance of System(s) and Interfaces 8.00% 18.03% 26.38%Pricing and Cost in Relation to Services Provided - Combination Proposal and Renewal of Maintenance - Both Purchase and Lease with Maintenance 13.11% 23.33% 21.22%

    Total 36.00% 76.30% 83.53%

  • Proposed Initial Investment

  • Recommendation

    • Brazos/Tyler/New World with a Phase 1 implementation

    • Why’s– Evaluation score– Current and more

    specifically the future integration of all the County's core products

    – All the listed benefits from prior pages

  • Action Needed Today: Approval of eCitation

    Resolution and move toAdministration Committee

    5/3/2016

  • Security OverviewKane CountyPRESENTED BYROGER FAHNESTOCK, CHIEF INFORMATION OFFICERKANE COUNTY GOVERNMENT

  • Physical Security

    Physical structures, buildings and infrastructure

    Data Centers and diversity

    Duplicate and redundant systems

    Access Control to Data Centers – Locked and Limited to SAs

    Logged and Monitored Access

    Alarm Systems and Management

    Video Surveillance

    Closed Power- Generator, Batteries, and By-Pass

    Closed Air Conditioning and Cooling

  • Systems Administration

    Systems Administration Group – Core ITD Team of Administrators

    Microsoft Active Directory Authentication

    Application Security Provided by Software Solutions

    NTFS Files System Security with AD Authenticated Users

    Virtualization Farm and Virtual Consolidation – Kane County Cloud

    Encrypted SSD Storage and Replicated Storage with Snapshot Capabilities

    Server Farm for Processing and Memory

    Core/Distribution Network between Data Centers and Buildings

    Antivirus for Servers and Clients

    Patch Management, Systems, and Software Updates

    Vulnerability Scan and Review

    Monitoring and Reporting for Availability and Performance

  • Network

    Fiber Optic Network

    Cable and T1 Circuit Network

    Managed Wireless Network – Authenticated Access to Data

    Layer 2 and Layer 3 Network – Core ITD Team of Administrators

    Perimeter Security – Firewall and Intrusion Detetection/Inspection

    Policy Based Access to public and private resources

    Virtual Private Networks P2P

    Policy Based SSL VPN for Authenticated Remote Access

    Vulnerability Scan and Review

    Monitoring and Reporting for Availability and Performance

  • Backup and Data Protection

    Replicated Data Across Virtual Farm and Storage Systems

    Daily Backups and Offsite Storage

    Monthly Remote Site Storage – 12 Months

    Yearly Archives and Remote Site Storage – 7 Years plus

    Virtual Backup Tools, Tape Backup, and Disk to Disk

    Network Configuration Backups

    Security Appliance Backups

    Backup and Protect Over 200 Systems

    Archival of Email Systems and Message Archiving

  • Internet Security

    Firewall Security for Server, Client, and Public

    SSL VPN for Secure Remote Access

    Replicated Data to DMZ SQL for public query

    Zero Exposure of Production Systems (Goal)

    Policy Inspection of Traffic

    Filters for Content

    Filters for Known Security Vulnerabilities

    Traffic Analysis, Review, and Updates

  • Desktop Security and Users

    Desktop Imaging and Deployment

    Authenticated Access – Computer Account and User Account

    Microsoft Patch Management and Updates

    Application Patch Management and Updates

    Antivirus

    Network Storage for Users and Shared Files

    Vulnerability Scan and Review

  • Court Case Management System

    Layered Approach similar to existing systems

    Integration into existing Virtual Platform and Storage

    Integration into existing Security Infrastructure

    Application Security is Being Configured

    Roles or Grouping of Responsibilities

    User Management

    Security Oversight and Governance

    Best Practices and Validation

    Auditing and Positive Controls

    Vulnerability Scan and Review

    CMS Project ReportSlide Number 2Slide Number 3Slide Number 4Project UpdateSlide Number 6Slide Number 7Slide Number 8Slide Number 9Slide Number 10eCitation OverviewEvaluation ResultsProposed Initial InvestmentRecommendationSlide Number 15Security Overview�Kane CountyPhysical SecuritySystems AdministrationNetworkBackup and Data ProtectionInternet SecurityDesktop Security and UsersCourt Case Management System