Record Keeping How should our data be handled? Katie Fore.

Slides:



Advertisements
Similar presentations
LEADS Law Enforcement Agencies Data System
Advertisements

IIJIS Privacy Policy Meeting June 2, 2004 Bureau of Identification Data Quality.
In Search of Insights and Better Analytics Prepared for: St. Louis Metropolitan Police Department 1 Nikolay Filipets / Ankit Patel / Melis Yilmaz / Divya.
THE “INNOCENCE PROJECT” By: Shayne Cahalan & Katelyn Lewis & Kori Forrest.
Computer Errors, Failures, and Risks Dr. Kapatamoyo 9/9/14.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
Maryland’s Security Integration Initiative Sometimes the most common sense solutions drive success Virginia Geckler Ron Brothers.
Instructional Volunteer Training Warren County Board of Education Effective February 1, 2011.
DNA Databases Ethical Issues and Legal Implications.
DNA FINGERPRINTING - AN ETHICAL ISSUE?. Student Activity  Who discovered DNA? and at which university?  What is DNA?  In what year do you think DNA.
A Brief History of Forensics. 8 th Century BC Chinese use fingerprints to identify authors and artists.
Fingerprinting 9/20/13. History of Fingerprinting 1924 in 1924, an act of congress established the Identification Division of the FBI. The National Bureau.
History of Fingerprinting. There are records of fingerprints being taken many centuries ago, although they weren't nearly as sophisticated as they are.
Automated Fingerprint Identification System (AFIS) Modernization Project Department Of Emergency Services and Public Protection Division of State Police.
Fire, Crime, Accident reporting. Preparation Sometimes you can check your newspaper library. At other times, breaking news is occurring and you must gather.
Volunteers – Background Screening Past Behaviors is the BEST Indicator of Future Behaviors.
Security, Privacy, and Ethics Online Computer Crimes.
Arizona Criminal Justice Information System
Public Information Online. Timothy WhitneyCaroline Aaron.
Family Watchdog Analysis GIS Lab: Attributes of Information Parent Perspective General Goal: Keep children away from risk Specific Usage: – Look up specific.
The Role of Computers in Surveillance ~ Katie Hatland.
Privacy & Personal Information -- Why do we care or do we?
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
THE HEART OF LIFE ON THE BEAT THE HEART OF LIFE ON THE BEAT Roger W. Ham Chief Information Officer Commanding Officer Los Angeles Police Department Roger.
BJA Regional Information Conference March 27 – 29, 2007 / Minneapolis, MN page:1 ACJC Arizona Criminal Justice Commission Presented by: Pat Nelson, Program.
1 CRIMINAL LAW (FORENSIC PROCEDURES) AMENDMENT BILL [B ]: ISSUES FOR CONSIDERATION AND COMPARATIVE ANALYSIS 6 October 2009 Sueanne S. Isaac.
NCJIS Modernization Program
The USA PATRIOT Act Part 2 YSU – Weapons of Mass Destruction Session 11a.
Forensic Databases Integrated Automated Fingerprint Identification System (IAFIS) Fingerprint and criminal history system for 50 million subjects Operational.
Tues 9/24/13 Bellringer: ◦ Take out your notes and respond to the following:  Would sap taken from a tree be class evidence or individual evidence? Why?
B CRIMINAL LAW (FORENSIC PROCEDURES) AMENDMENT BILL WHY WE NEED THIS CRUCIAL LEGISLATION IN SA.
Stephen Gresko Senior Criminalist Nevada State CODIS Administrator WASHOE COUNTY SHERIFF’S OFFICE FORENSIC SCIENCE DIVISION.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Criminal Investigations 1.The Crime Scene 2.ID Suspect 3.Informants.
Search and seizure. Purposes of a search Fruits of the crime (e.g., stolen property) Instrumentalities of the crime (e.g., a gun, burglary tools) Circumstantial.
Conducting Waste Assessments North Carolina WasteWise Program Hands-On Training May 17, 2000 Department of Correction Raleigh, NC.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
1 Criminal History Repository Status Report NCJIS Advisory Committee July 31, 2007.
3.2 Notes Crime Scene Reconstruction, Forensic Databases.
Human Genetics and Genetic Technology Using Genetic InformationUsing Genetic Information.
DNA, crime and law enforcement Personal Genetics Education Project (pgEd) Harvard Medical School
SEARCH SEARCH, The National Consortium for Justice Information and Statistics
Criminal Investigations 1.The Crime Scene 2.ID Suspect 3.Informants.
Company LOGO Welcome to Home Access Center (e-HAC) Socorro Independent School District Rojas Rd El Paso, Texas Our information.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Database Management Systems
SEARCH, The National Consortium for Justice Information and Statistics Melissa Nee Government Affairs Specialist SEARCH Overview Briefing.
Forensics (DNA Technology). What is DNA? DNA is the carrier of genetic information and provides a structural plan for proteins. It consists of linear.
SECRETARIAT OF POLICE1 Presentation to Select Committee on Security and Constitutional Affairs on the Criminal Procedures (Forensic) Amendment Act 28 July.
INFORMATION GOVERNANCE AND CONFIDENTIALITY Information Governance Facilitator.
The Patriot Act Is Spying on US citizens Ethical?
Individual Activity: After reading the article, “Facial Recognition Technology” answer the questions on the assigned worksheet.
Criminal Court Proceedings. Investigation Police gather evidence in the crime, in order to get an arrest warrant signed by a judge. Police may arrest.
BJA Regional Information Conference June / Jacksonville, Florida page:1 ACJC Arizona Criminal Justice Commission Presented by: Pat Nelson, Program.
Bosnia & Herzegovina Statistical Training
DNA Profiling LEARNING OUTCOMES: State what DNA profiling is
8.1 Levels of Police in Canada/Starting a Police Investigation
DNA Fingerprinting 13.3 What is DNA used for?
Ridge Characteristics
AFIS and CODIS Duyen & Ladaysha.
Health and Safety! By jack Hughes.
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
Reviews “How’s it going?”
Warm Up – April 2 Answer the following question on a post it:
15-5 Automated Fingerprint Identification System
Implementation Business Case
RECORDING AND DOCUMENTING IMMIGRATION CONTROLS
Ethics, Innovation and the Law
Presentation transcript:

Record Keeping How should our data be handled? Katie Fore

Agenda 3 questions to ask about your data ◦ Is the information necessary? ◦ How is it gathered and stored? ◦ What steps are taken to ensure accuracy? Record keeping today The question of a National CCH System

Question 1 Is the scope of data the company or entity is collecting necessary to achieve their stated purpose ?

Question 1 Is the scope of data the company or entity is collecting necessary to achieve their stated purpose ? If not… ◦ Unfair prejudice ◦ Unnecessary risk to your data

Question 2 How is my data gathered and stored?

Question 2 How is my data gathered and stored? ◦ Does collection invade my privacy?

Question 2 How is my data gathered and stored? ◦ Does collection invade my privacy? ◦ Is storage sufficiently safe?

Question 3 What steps are being taken to ensure my information is accurate?

Question 3 What steps are being taken to ensure my information is accurate? ◦ From where is data collected?

Question 3 What steps are being taken to ensure my information is accurate? ◦ From where is data collected? ◦ Do I have access to the data?

National Computerized Criminal History System What are the benefits of a centralized system? What are the dangers? What sort of legislation is necessary to protect innocent citizens?

National Crime Information Center Contains information on arrest warrants and arrests for stolen property, murder, sex offenders, fugitives, gang members, suspected terrorists, missing persons, etc. Managed by FBI Contains more than 15 million active records Records received on voluntary basis from local agencies

Issues Pros ◦ Allows agencies to share information quickly ◦ Easier to catch bad guys

Issues Pros ◦ Allows agencies to share information quickly ◦ Easier to catch bad guys Cons ◦ Problems with system ◦ Information entered by individual agencies  Terry Dean Rogan v. City Of Los Angeles

Other Systems Integrated Automated Fingerprint Identification System ◦ Contains fingerprint and identification information from anyone who has been arrested or had a background check Combined DNA Index System

National Computerized Criminal History System What are the benefits of a centralized system? What are the dangers? What sort of legislation is necessary to protect innocent citizens?

References 9F2d72_1747.xml&docbase=CSLWAR &SizeDisp=7 Edgar, S. L. (1997). Morality and Machines: Perspectives on Computer Ethics. (p 265 & p 232)