27
Strategies to Overcome: --Limited Staff & Resources, --Stakeholders with Competing Missi --Security & Privacy Challenges llinois Criminal Justice Information Authori February 5, 2013

Strategies to Overcome: --Limited Staff & Resources, --Stakeholders with Competing Missions --Security & Privacy Challenges

  • Upload
    arvid

  • View
    27

  • Download
    0

Embed Size (px)

DESCRIPTION

Strategies to Overcome: --Limited Staff & Resources, --Stakeholders with Competing Missions --Security & Privacy Challenges . Illinois Criminal Justice Information Authority February 5, 2013. Presenters/Discussants. Cabell Cropper, Moderator Paul Wormeli Jason Hutchens - PowerPoint PPT Presentation

Citation preview

CJIS Constraints

Strategies to Overcome: --Limited Staff & Resources, --Stakeholders with Competing Missions --Security & Privacy Challenges Illinois Criminal Justice Information AuthorityFebruary 5, 20131Page #Presenters/DiscussantsCabell Cropper, ModeratorPaul WormeliJason HutchensDiana GraskiAND YOU!!!

2Page #Wheres the Money?How to pay for justice information technology IJIS Institute National Program AreasNationwide SAR InitiativeGang Intelligence Information SharingFusion Center TAFBI CJIS (N-DEx NGI UCR/NIBRS)Prescription Drug Monitoring/TAJustice/Health Information Exchange

Public Safety Information Sharing & InteroperabilityAdult Offender Re-EntryAutomated Victim Information/NotificationTraining and Technical AssistanceSpringboard Standards-Based Innovation

4Page #

IJIS ServerState SystemNational Systems

Police Department ASheriffAdult Court ServicesOther Justice AgenciesDistrict AttorneyJudicial District Judiciary and Court Clerks Office Community Corrections Public AccessMunicipal Court Juvenile Court Services Police Department B Local or Wide area NetworkOther AgenciesJustice Community of Interest

Public Access ServerFirewallFirewallFirewall5The IJIS Repository acts as the system manager. IJIS organizations can publish information to the repository. This information can be actual data or pointers to data that exist on other systems. Agencies can also subscribe to information and be notified whenever the IJIS repository becomes aware of new information and its location. Individual Agencies can query other agencies for information. The repository can also server as the keeper of Master Indices, e.g. Master Name Index, Master Vehicle Index, etc.Page #is at the heart of everything we need to do to improve publicsafety and the quality of justice in AmericaInformationSharingAxiom:Discuss overcoming stakeholders with competing missions. All players have the same goal: improve public safety and the quality of justice. 6Page #Federal Justice support modelContact OJP Bureau of Justice AssistanceAsk for funding supportBuild application on use of advanced technology (model) and use of standardsReview OJP grant programs and develop grant applications around program guidelinesCombine grants in various programs to fund system integrationUS DOJ fundingBureau of Justice AssistanceNational Institute of JusticeBureau of Justice StatisticsOffice for Victims of CrimeOffice of Juvenile Justice and Delinquency PreventionCommunity Oriented Policing ServicesViolence Against Women ActFederal DHS supported modelHomeland security allowable expenditures support CAD, intelligence systems and information sharingDiscuss needs and approaches with state homeland security director and DHS Federal officialsIncorporate strategic planning and regional information sharing objectivesmultiple agency systems receive more interestFollow DHS grant guidelinesImproving funding probabilityAdopt/support national standardsGlobal Reference ArchitectureNIEMGlobal Federated Identity and Privilege Management (GFIPM)Be innovative with technologyCloud computing, mobility, social mediaShared resources/consolidationPortal to Global productshttp://www.it.ojp.gov/gistConnect to social issues, e.g.:Offender re-entry (reduce recidivism)Jail overcrowdingCriminalizing mental illnessCybercrime (identity theft, etc.)Juvenile violence reductionCrime/terrorism prevention..Collaborate or Perish--Bill BrattonOther Federal SourcesDepartment of TransportationInformation Sharing EnvironmentDepartment of Health and Human ServicesDepartment of the Interior including BIA

Talk about strategies to overcome competing missions. 14Page #State-supported Justice ModelMeet with state justice agency administrator who handles block grants (LLEBG and Byrne) fundingDevelop a strategic plan using state guidelines for project funding Build grant application on conformance to state strategic planning rulesInclude data on projected outcomes of integration including cost avoidance and improved performanceSell to state block grant administration bodies15Page #Do it yourself modelEstablish consensus among stakeholdersBuild a business caseIdentify redundancies in data entry and determine cost savings by re-engineering processesQuantify cost avoidance based on technology useDefine benefits to the community (ROI)Obtain testimony from executives on overall benefits to public safety and the administration of justiceIdentify a leader who will sell the concept to funding bodiesPolitical ModelPrepare a concept paper on the approach, benefits and cost of the system you wish to buildSeek political support from all stakeholder organizationsApproach your Congressman and both senators and ask for their support in getting Federal funding from various sourcesEngage community and advocacy groups for support of project fundingFoundation ModelIdentify foundations that support justice purposes (foundationcenter.org)Determine foundation areas of interest and application rulesPay attention to application cycleCreate your own foundationNon-profitFundraising expertise

ExploreFee for ServiceUse the internet resourceshttp://it.ojp.gov/index.jsphttp://www.ojp.usdoj.gov/fundopps.htmhttp://grants.gov/http://www.cfda.gov/public/granttopics.asphttp://www.dhs.gov/dhspublic/index.jsphttp://www.nhtsa.dot.govhttp://www.nlectc.org/virlib/InfoList.asp?strType=Fundinghttp://www.agileprogram.org/grants_funding/justnet.htmlhttp://www.ntia.doc.gov/top/http://www.usfa.fema.gov/fire-service/grants/http://www.usdoj.gov/10grants/index.htmlSecurity & Privacy ChallengesDo you characterize your job role as

1. policy dev, program mgr?2. technologist?3. practitioner?4. agency executive?5. something completely different?In your personal life, do you access

1. on-line school?2. on-line banking?3. on-line health?Have you ever been told, Wed love to share that data, but we cant because of . . . - HIPAA - SAMHSA - FERPA - another statute, regFor your day job, how many userid-passwords do you maintain?www.TechnicalPrivacyTraining.org

- user authentication (identity)

- fine-grained authorization (access)

It will soon shake your windows and rattle your walls, For the times they are a-changin

-----Bob Dylan

Paul Wormeli, ED EmeritusIJIS [email protected]

Di Graski, [email protected]

Jason [email protected]