Wednesday, April 8, 2020
Public Safety Law Enforcement Records Management Essay Example
Public Safety Law Enforcement Records Management Essay PUBLIC SAFETY LAW ENFORCEMENT Records Management Submitted By Table of Contents 1. 0 Introduction 2 2. 0 Components of a records management system 2 2. 1 System Architecture 2 2. 2 Security 4 2. 3 Query Capabilities 4 2. 4 Reporting Capability 5 2. 5 Interface Capabilities 5 2. 6 State and Federal Reporting with Automatic Transfer Capability 5 2. Basic Statistical Data Modules 6 2. 8 Other Data Modules 8 3. 0 Law enforcement personals 9 4. 0 RMS AND LAW ENFORCEMENT TERMS TO KNOW 11 1. 0 Introduction Managing the daily influx of law enforcement information is a massive job ââ¬â one that requires the best tools available to not only make it manageable, but also productive. Law Enforcement Records Management solution streamlines the process by linking people, property, places, and related records into one central database with an intuitive user interface. A law enforcement agency needs a Records Management System (RMS) to enter information regarding criminal events that occur in their jurisdiction. The organized information can be easily transmitted to the agencyââ¬â¢s State and/or the Federal criminal statistic repository. In addition to transmitting crime data, or for an agency that is not required to transmit crime statistics, the following benefits are also available with a Records Management Systems: * Provide real time information to dispatchers Better manage staffing requirements by shifts, locations and day of the week * Provide an investigator resource * Provide a history of department activity * Provide information to the governing boards and commissions * Provide public information to the media and the public * Help the agency to define its public service policies for non-criminal activity 2. 0 Components of a Records Management System A Records Management System is a comprehensive computer program designed to enter and track crime statistical data and provide the agency management staff with the information needed to manage the agency. We will write a custom essay sample on Public Safety Law Enforcement Records Management specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Public Safety Law Enforcement Records Management specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Public Safety Law Enforcement Records Management specifically for you FOR ONLY $16.38 $13.9/page Hire Writer It is important that the Records Management System be able to send the required data fields to the State (and ultimately, the Federal) crime statistics repositories. Even if the agency is currently not required (based on State guidelines) to transmit statistical data, it may be a future requirement. It is also important that the Records Management System have a user interface that is easy to navigate and that presents important data immediately for the user. 2. 1 System Architecture The type of hardware and software is dependent on the size of the agency. A single PC (equipped with a modem) with an operating system of Microsoft Windows will provide a sufficient platform for a small agencyââ¬â¢s RMS tracking needs and State/Federal UCR needs. Larger agencies or multi-agency organizations may require file servers, networks, mainframe computers, or, generally, more sophisticated hardware and software. Features * Incident Report * Case Management * Citations * Arrests * Permits * Warrants * Field Contacts Technical Specs * Utilizes True Relational Databases including MS SQLâ⠢ * Central Server or Distributive System Architecture * Share Only the Information You Wish to Share Off Site Data Synchronization 2. 2 Security Juvenile names entered into an RMS need to be identified and protected by restricting access to such names, making them available for reference by appropriate users of the system. Juvenile and other sensitive nature case file and/or other contact information must also be identified and supported through a restricted a ccess mechanism. Other security issues are: System access security (login protection), user level security (user permission of add/edit/delete), query only access (other agency or public access) and Administrative security (security and system management). . 3 Query Capabilities A RMS needs to provide the ability to perform searches (queries) based on one or more criteria (data field) in any combination including ââ¬Å"wild cardâ⬠searches for partially known data. For example, aquery could be executed in RMS to locate the owner of a green Ford van that has a badly dented front left fender that was reported to be involved in any incident between March 3, 1999, through December 31, 2002, with a license plate number containing the digits ââ¬Å"423. â⬠The query capability should search through data fields and text narrative fields to locate all references of the above example. . 4 Reporting Capability A wide variety of reports including summary, statistical and detailed re ports should be readily available to the user. In addition to reports that are provided with the RMS, the user needs to be able to create unique reports based on specific criteria. 2. 5 Interface Capabilities The RMS needs to be able to easily receive data from a Computer Aided Dispatch (CAD) system and should support and/or provide output to other information sources like Jail Management, neighbouring agencies, Regional and State based data warehouses, Court systems, Imaging systems, Fingerprint systems, etc. . 6 State and Federal Reporting with Automatic Transfer Capability Over the years, the development of a national data collection effort has been established and expanded by the FBI, the IACP (International Association of Chiefs of Police), the National Sheriffââ¬â¢s Association, and various other local, state, and federal criminal justice agencies. Because of the growing challenge of increased crime, the UCR Program has been studied and revised to meet the current and futur e needs of the law enforcement community. The revision of the UCR Program led to the National Incident-Based Reporting System (NIBRS). Crime statistics are gathered on city, state, and federal levels and, ultimately, provide a nationwide view of crime as it is reported by law enforcement agencies throughout the country. The data is used to indicate the levels and nature of crime and to provide a reliable management tool for decision makers of the criminal justice community. NIBRS provides law enforcement with the tool to fight crime by producing detailed, accurate, and meaningful data. In addition to the UCR and NIBRS, there are other State reporting repositories (juvenile only crimes, property loss/recovery, jail statistics, etc. to which an agency may transmit statistical data. 2. 7 Basic Statistical Data Modules A Records Management System is comprised of ââ¬Å"modulesâ⬠which are simply sections of data grouped by relevance. Each module captures a particular set of data, however, the information (fields) contained in a module needs to be made available to the other modules. For example, an individualââ¬â ¢s name is entered into the Names module, but needs to be listed as the owner of a particular car within the Vehicles module. Following is a description of the basic module data that can be collected in RMS modules: Administrative Data consisting of unique agency information, such as agency name, address, phone numbers, ORI Number, officer badge numbers and names, personnel data, etc. Names Data fields pertaining to a name involved in an incident. A name can be an individual (an adult or a juvenile) or a non-individual (a business, a gang, etc. ). Name information includes addresses, phone numbers, identification documents, general physical characteristics, etc. Incident An ââ¬Å"incidentâ⬠is defined as one or more offenses committed by the same offender (or group of offenders). An incident module is a database table of all data fields pertaining to the incident that occurred including: * How the incident was made known to the law enforcement agency * In general, what crime was reported * When and where the crime occurred * Who (victims, officers, offenders, witnesses, etc. ) was involved in the crime (links to Names) * State and/or Federal offense codes and statutes or ordinances involved * Various detailed narrative reports provided about the incident pictures or other documents * Arrests * Vehicles Victim Since more than one victim can be involved in an incident, a Victim Sequence Number is assigned to each victim. In addition to the sequence number, the following information should be gathered for each victim: * The UCR offense code(s) which were perpetrated against the victim * Type of victim (individual, business, government, etc. ) * Personal characteristics (age, sex, race, etc. ) * Resident status * Type of injury * Offender number(s) (see Offender) * Relationship of victim to offender number Offender Since more than one offender can be involved in an incident, an Offender Sequence Number is assigned to each offender. If nothing is known about the offender, the number is ââ¬Å"00. â⬠Other information about offenders include: * Age, sex, and race of offender Arrest The data fields regarding all persons apprehended for all criminal offenses. * Arrestee sequence number (to accommodate more than one person arrested per incident) * Arrest transaction number refers to the arrest report number (can be the Incident Number relating to the arrest or a separate arrest number assigned by the agency) * Arrest date * Type of arrest (i. e. summoned or cited) * Offense code for which the arrestee was apprehended * Arrestee personal characteristics (age, sex, race, etc. ) * Disposition of an arrestee under 18 (juvenile) Property Property data fields describe the type, value, and quantity of property involved in an incident. This module also tracks what happens to the property, i. e. , burned, forged, destroyed, recovered, etc. , and the associated dates. 2. 8 Ot her Data Modules Other modules can be used within a Records Management System that are useful in data tracking as well as time and resource management. Following is a list and description of other possible RMS data modules: Citations Written tickets issued by a law enforcement officer when a crime is committed. This module is useful when multiple citations are automatically linked to names and vehicles. Vehicles A repository for cars, trucks, motorcycles, etc. , involved in citations or incidents. Data tracked could be VIN (Vehicle Identification Number), License Plate Number, Make, Model, Year, distinguishing features, etc. Vehicles can be linked to names. Jail Management Details about a personââ¬â¢s stay at a jail. Jail data collection provides for tracking of the following: * Multiple charges * Booking information * Rebook information * Beginning dates, expected release and sentence end dates * Prisoner accounting (for purchases and deposits) * Jail activities (medication, court dates, etc. ) * Inmate housing movements * Electronic fingerprint and mug shots Warrants Provides tracking of the warrant services with a check to determine if the person who was issued the warrant is in jail. Civil Process Provides logs of service attempts including who, where, and when. Also provides accounting management for fees incurred for the process event. Services Billing Tracks chargeable services (such as false alarm incidents, funerals, gun permits, various licenses). Case Management Provides tracking of an incident (case) through the law enforcement system. Property Management Provides for extended tracking of property items the department has in custody that may or may not be related to an incident. Includes the ability to track all of the handling movement of the property (chain of custody) while in the departmentââ¬â¢s possession. Law Enforcement Employees Management Collects and tracks information relating to all employees of an agency. LEOKA (Law Enforcement Officers Killed or Assaulted) Tracks information pertaining to line-of-duty felonious or accidental killings of and assaults on sworn law enforcement officers. 3. 0 Law enforcement personals Below is a description of the law enforcement personnel and how they use a Records Management System. Data Entry/Records Personnel: Responsible for typing the required information into the correct data fields of the RMS to complete the electronic incident records, process state and/or federal reports, citations and the like. They typically also provide service to the public for incident report requests, summary information for media, requests from other agencies, and officer queries. Dispatchers: Responsible for using the RMS to quickly access information about previous calls at a specific location or related to an individual. The RMS also becomes a tool to check dispositions of former cases or for providing investigator information to officers. Investigators: Who uses the RMS to help solve a case by looking for incident information with similar modus operandi, researching suspect people or vehicles, reviewing previous dispositions regarding a suspect, etc. Patrol Officers: Who enter reports or use the system to follow up on open files regarding vehicles or suspects etc. Department Heads: Responsible for using the RMS to review the currently open case, respond to the public and/or commissions regarding the departmentââ¬â¢s activity in general or toward a specific incident. Administrative Staff/Supervisors: Responsible for using the RMS to develop officer activity information, local crime statistics, shift management, personnel reviews, etc. 4. 0 RMS And Law Enforcement Terms To Know
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.