1 / 27

Strategies to Overcome: --Limited Staff & Resources, --Stakeholders with Competing Missions --Security &

Strategies to Overcome: --Limited Staff & Resources, --Stakeholders with Competing Missions --Security & Privacy Challenges . Illinois Criminal Justice Information Authority February 5, 2013. Presenters/Discussants. Cabell Cropper, Moderator Paul Wormeli Jason Hutchens

arvid
Télécharger la présentation

Strategies to Overcome: --Limited Staff & Resources, --Stakeholders with Competing Missions --Security &

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Strategies to Overcome: --Limited Staff & Resources, --Stakeholders with Competing Missions --Security & Privacy Challenges Illinois Criminal Justice Information Authority February 5, 2013

  2. Presenters/Discussants • Cabell Cropper, Moderator • Paul Wormeli • Jason Hutchens • Diana Graski • AND YOU!!!

  3. Where’s the Money? How to pay for justice information technology

  4. IJIS Institute National Program Areas • Nationwide SAR Initiative • Gang Intelligence Information Sharing • Fusion Center TA • FBI CJIS (N-DEx – NGI – UCR/NIBRS) • Prescription Drug Monitoring/TA • Justice/Health Information Exchange • Public Safety Information Sharing & Interoperability • Adult Offender Re-Entry • Automated Victim Information/Notification • Training and Technical Assistance • Springboard – Standards-Based Innovation

  5. Justice Community of Interest State System National Systems Adult Court Services Sheriff Juvenile Court Services Firewall Public Access Server District Attorney Other Justice Agencies Police Department A Local or Wide area Network IJISServer Judicial District Judiciary and Court Clerks Office Police Department B Community Corrections Municipal Court Other Agencies Public Access Firewall Firewall

  6. is at the heart of everything we need to do to improve publicsafety and the quality of justice in America Axiom: Information Sharing

  7. Federal Justice support model • Contact OJP Bureau of Justice Assistance • Ask for funding support • Build application on use of advanced technology (model) and use of standards • Review OJP grant programs and develop grant applications around program guidelines • Combine grants in various programs to fund system integration

  8. US DOJ funding • Bureau of Justice Assistance • National Institute of Justice • Bureau of Justice Statistics • Office for Victims of Crime • Office of Juvenile Justice and Delinquency Prevention • Community Oriented Policing Services • Violence Against Women Act

  9. Federal DHS supported model Homeland security allowable expenditures support CAD, intelligence systems and information sharing Discuss needs and approaches with state homeland security director and DHS Federal officials Incorporate strategic planning and regional information sharing objectives—multiple agency systems receive more interest Follow DHS grant guidelines

  10. Improving funding probability • Adopt/support national standards • Global Reference Architecture • NIEM • Global Federated Identity and Privilege Management (GFIPM) • Be innovative with technology • Cloud computing, mobility, social media • Shared resources/consolidation

  11. Portal to Global products http://www.it.ojp.gov/gist

  12. Connect to social issues, e.g.: • Offender re-entry (reduce recidivism) • Jail overcrowding • Criminalizing mental illness • Cybercrime (identity theft, etc.) • Juvenile violence reduction • Crime/terrorism prevention • …..

  13. Collaborate or Perish--Bill Bratton

  14. Other Federal Sources • Department of Transportation • Information Sharing Environment • Department of Health and Human Services • Department of the Interior including BIA

  15. State-supported Justice Model • Meet with state justice agency administrator who handles block grants (LLEBG and Byrne) funding • Develop a strategic plan using state guidelines for project funding • Build grant application on conformance to state strategic planning rules • Include data on projected outcomes of integration including cost avoidance and improved performance • Sell to state block grant administration bodies

  16. Do it yourself model • Establish consensus among stakeholders • Build a business case • Identify redundancies in data entry and determine cost savings by re-engineering processes • Quantify cost avoidance based on technology use • Define benefits to the community (ROI) • Obtain testimony from executives on overall benefits to public safety and the administration of justice • Identify a leader who will sell the concept to funding bodies

  17. Political Model • Prepare a concept paper on the approach, benefits and cost of the system you wish to build • Seek political support from all stakeholder organizations • Approach your Congressman and both senators and ask for their support in getting Federal funding from various sources • Engage community and advocacy groups for support of project funding

  18. Foundation Model • Identify foundations that support justice purposes (foundationcenter.org) • Determine foundation areas of interest and application rules • Pay attention to application cycle • Create your own foundation • Non-profit • Fundraising expertise

  19. ExploreFee for Service

  20. Use the internet resources • http://it.ojp.gov/index.jsp • http://www.ojp.usdoj.gov/fundopps.htm • http://grants.gov/ • http://www.cfda.gov/public/granttopics.asp • http://www.dhs.gov/dhspublic/index.jsp • http://www.nhtsa.dot.gov • http://www.nlectc.org/virlib/InfoList.asp?strType=Funding • http://www.agileprogram.org/grants_funding/justnet.html • http://www.ntia.doc.gov/top/ • http://www.usfa.fema.gov/fire-service/grants/ • http://www.usdoj.gov/10grants/index.html

  21. Security & Privacy Challenges

  22. Do you characterize your job role as1. policy dev, program mgr?2. technologist?3. practitioner?4. agency executive?5. something completely different?

  23. In your personal life, do you access1. on-line school?2. on-line banking?3. on-line health?

  24. Have you ever been told, “We’d love to share that data, but we can’t because of . . .” - HIPAA - SAMHSA - FERPA - another statute, reg

  25. For your “day job,” how many userid-passwords do you maintain?

  26. www.TechnicalPrivacyTraining.org - user authentication (identity) - fine-grained authorization (access)

  27. Paul Wormeli, ED Emeritus IJIS Institute—www.ijis.org paul.wormeli@ijis.org Di Graski, NCSC dgraski@ncsc.org Jason Hutchens jasonhutchens@motorolasolutions.com It will soon shake your windows and rattle your walls, For the times they are a-changin’ -----Bob Dylan

More Related