470 likes | 581 Vues
This guide outlines the essential steps for filing criminal and non-criminal cases in the Judicial Information System (JIS), including procedures for juvenile offender and dependency cases. It emphasizes the importance of adding victims and participants correctly, processing protection-type orders, and maintaining security within the JIS framework. With security procedures highlighted, users can ensure compliance and confidentiality while navigating through case processing. Understanding these protocols is crucial for legal professionals and court administrators.
E N D
JIS Case Processing and Security Jan Hickey, JIS Education Services
JIS Case Processing & Security • Filing criminal cases and adding victims • Filing non-criminal cases and adding participants • Filing juvenile offender and non-offender cases • Processing protection-type orders • JIS security overview
JIS Person Business Rule 1.40Start in JIS for these causes of action & participants. For all other causes, start in SCOMIS. For all other participants, add in SCOMIS.
Adding Victims – Criminal VCT names added in JIS are not sent to SCOMIS.
Adding participants to non-criminal cases SCOMIS Names screen is updated.
Juvenile Offender JIS Case Processing • File case based on an existing referral in the Juvenile Department • File case and auto-generate a referral for the Juvenile Department
Juvenile Offender JIS Case Processing (based on a referral) In this process, the Juvenile Department creates the referral FIRST using JIS and JCS.
Juvenile Offender JIS Case Processing Using the referral number in the Navigator bypasses a search.
Juvenile Offender JIS Case Processing After filing, this message screen displays. The Juvenile Department will receive a notification in JCS about this case. Docket entries you make on the case will affect the JCS referral.
Juvenile Offender JIS Case Processing (auto-generated referral) In this process, the Clerk’s Office files the case FIRST and auto-generates a referral for the Juvenile Department.
Juvenile Offender JIS Case Processing You must confirm auto-generation of the referral if you file the case first.
Juvenile Offender JIS Case Processing After filing, this message screen displays. The Juvenile Department will receive a notification in JCS about this case and the automatic referral. Docket entries you make on the case will affect the JCS referral.
Juvenile Dependency JIS Case Processing (based on a referral)
Juvenile Dependency JIS Case Processing After filing, this message screen displays. The Juvenile Department will receive a notification in JCS about this case and the automatic referral. Docket entries you make on the case will affect the JCS referral.
Juvenile Dependency JIS Case Processing(auto-generate a referral)
JIS Online Manual Superior Court Case Processing
J I S SCOMIS Protection-Type Orders
J I S WACIC NCIC Where does the order go? • Violation of a No Contact Order is a gross misdemeanor RCW 26.50.110(2). • Violation of a "no firearms provision" is a federal offense.
Order Screens • Order Add (ORDA) • Order Update (ORD) • With Pop-up Add Participant Window • Order Inquiry (ORDI) • Order Delete (ORDD) • Order History (COH/IOH)
Order Add screen (ORDA) for a criminal case when SCOMIS charge is DV = Y Order Type is NCO (prefills). Judge and expiration date are required. Decision is P (protected) or R (restrained).
Order Add screen (ORDA) for a criminal case when SCOMIS charges show DV = N Enter Order Type NCO or SXP. Judge and expiration date are required. Decision is P (protected) or R (restrained).
Order Add screen (ORDA) for a non-criminal case Specify Order Type. Edits based on cause and DV-Flag.
On the SCOMIS Basic screen ... Order Type and expiration date display from JIS.
On the SCOMIS Docket screen ... Order Type and expiration date display from JIS.
ORDA vs ORD • ORDA • Add Order • Modify Order • Add denied order • ORD • Add Order Participant • Terminate Order
For causes in Rule 1.50 and 1.60, convert case to JIS if there is an order
Security Application Security Signon Security (RACF) Cashier Security Authorization Security
Signon Security • A User ID and password are the first level of JIS security.
Application Security • The mainframe TPX Menu lists all applications a user is able to access.
Authorization Security JIS users authorization security is set by a local security administrator. • Screens (S) • Tables (T) • Case Types (C) • Utilities (U) • Family Relationships (F) • SCOMIS users authorization security is set by AOC at the request of a local administrator. • Commands • Case Types
Maintaining Signon (RACF) Security • Strictly control who is given a User ID. • Regularly review the User List generated by RACFADMN. • Regularly review the Active user List requested from AOC Customer Services. • Promptly reset signon passwords using RACFADMN. • Delete User IDs when necessary using RACFADMN.
Maintaining JIS Authorization Security • Control security on the ATHA and ATHX screens. • Regularly review each user’s Local Court Profile Security Report generated from the ATH screen. • Delete security authorizations using the ATHD screen when a person leaves court employment. • Keep the level of security consistent with job duties.
Request RACF IDs or Changes Online • Inside.Courts • Court Resources • Court Management • Manage JIS User IDs • Manage JIS User Access • Manage SCOMIS User Access
The RACFADMN Utility • ---------- RACF Administration Manager Menu Selection Panel ----------------- • USERID - S99AS99 • DATE - 03/14/2000 • TIME - 12:06 • OPTION ===> • 1 RESET PASSWORDS Assign temporary passwords for revoked JIS User IDs • 2 DELETE USERS Delete RACF user definitions in batch • 3 CREATE USER LIST Create a report of User IDs for site S99A • X EXIT Exit from RACF Administration Manager • Type your selection on the OPTION line and press ENTER. • PF1=HELP Use to Reset passwords, delete User IDs, and Create a Site User List