ࡱ> imhy 'bjbj V{{54hz<?:(4HT?V?V?V?V?V?V?$AiD*z?44z?4?$$$6T?$T?$$5|*6 2 5@??0?5~D& D$*6*6&DP6$z?z?!?D : Service Description for Criminal Justice Information System (CJIS) Interface  DOCPROPERTY Client \* MERGEFORMAT Example Department of Public Safety Prepared by: [Enter] AUTHOR \* MERGEFORMAT  Version: [Enter] Date Prepared: [Enter] Table of Contents  TOC \o "1-3" \h \z \u  HYPERLINK \l "_Toc318988126" Service Name  PAGEREF _Toc318988126 \h 1  HYPERLINK \l "_Toc318988127" Service Description  PAGEREF _Toc318988127 \h 1  HYPERLINK \l "_Toc318988128" Service Provisioning  PAGEREF _Toc318988128 \h 1  HYPERLINK \l "_Toc318988129" Provisioner  PAGEREF _Toc318988129 \h 1  HYPERLINK \l "_Toc318988130" Current Status and Future Plans  PAGEREF _Toc318988130 \h 1  HYPERLINK \l "_Toc318988131" Governance  PAGEREF _Toc318988131 \h 1  HYPERLINK \l "_Toc318988132" Service Scope / Customers  PAGEREF _Toc318988132 \h 1  HYPERLINK \l "_Toc318988133" Service Features and Functionality  PAGEREF _Toc318988133 \h 2  HYPERLINK \l "_Toc318988134" Continuity Plan  PAGEREF _Toc318988134 \h 2  HYPERLINK \l "_Toc318988135" Criticality  PAGEREF _Toc318988135 \h 2  HYPERLINK \l "_Toc318988136" Service Resumption / Disaster Recovery  PAGEREF _Toc318988136 \h 2  HYPERLINK \l "_Toc318988137" Service Level Commitments  PAGEREF _Toc318988137 \h 2  HYPERLINK \l "_Toc318988138" Service Consumer Requirements / Prerequisites  PAGEREF _Toc318988138 \h 2  HYPERLINK \l "_Toc318988139" Cost / Funding Model  PAGEREF _Toc318988139 \h 3  HYPERLINK \l "_Toc318988140" Technology  PAGEREF _Toc318988140 \h 3  HYPERLINK \l "_Toc318988141" Core Competency Evaluation  PAGEREF _Toc318988141 \h 3  HYPERLINK \l "_Toc318988142" Efficiency Analysis  PAGEREF _Toc318988142 \h 3  Service Name Criminal Justice Information System (CJIS) Service Description The Criminal Justice Information System provides accurate and timely criminal justice information to law enforcement. Service Provisioning This section contains provisioning information for the service: Example Department of Public Safety Information Technology Office (ITO) Administration Building Fourth and Main, Room 210 Anytown, USA Currently providing services Provisioner This service is provided by the Information Technology Office. Phone: 999-555-1234 or visit the Department Intranet to submit new user requests, etc. Current Status and Future Plans Current status of the service: PRODUCTION Current version (from CMDB, if using) or date of release: Upgrade completed Nov. 2009 Future release plans: Governance What is the governance, strategy, and oversight model for the service? Agency management Does the provisioner maintain an advisory board to gain customer input? Input from customers and agency management Does the board have decision-making authority or is it advisory only? What is the accountability modelare there performance metrics or monitoring mechanisms in place to measure achievement of service levels? How are decisions made about future plans / upgrades / enhancements to the service? Changes are evaluated and prioritized by agency management. How are the cost model and its parameters determined? The ITO is staffed by state employees and at times utilizes contract services for additional staff resources as needed. The ITO funding comes from special revenue accounts and general fund appropriations. Service Scope / Customers Indicate current scope of service offering to whom is the service available? Access to CJIS is only available to law enforcement agencies designated in statute, established by a governors executive order, or approved by the attorney general. Service Features and Functionality Describe the features, functions, and benefits of the service. CJIS connects local agencies to state criminal history files, state vehicle and drivers license files, and priority or hot files. CJIS connects the state to national agencies such as the Federal Bureau of Investigation (FBI) and out-of-state resources such as the National Law Enforcement Telecommunications System and the National Crime Information Center (NCIC). CJIS is not only a record exchange system but also an identification tool providing real-time information to law enforcement officers operating in the field. CJIS is visible to the public as the tool law enforcement uses in the field to identify people and vehicles. For example, a law enforcement officer accesses CJIS via radio or mobile data terminal when making a traffic stop. Continuity Plan This section describes the criticality to the business of service availability, and the provisioners plans to resume service delivery in the event of a disruption. The database servers with criminal justice information are the highest priority to resume in the event of a disruption. The LAN Support Section team members have in place many precautions to prevent disruptions and procedures that are maintained and practiced to swiftly resume service if needed. Criticality Mission Critical Service Resumption / Disaster Recovery Describe plans for resumption of the service in the event of a disruption. Service resumption for CJIS is critical and the restoration of it is the highest priority. In the event of a disaster, the ITO staff have procedures for restoring the operation, quickly and efficiently, on standby equipment at an alternate location or within the Disaster and Emergency Services mobile IT support truck they will restore the minimal services, such as CJIS and Public Safety communications systems first. Service Level Commitments The provisioner commits to delivery of the service in accordance with the following service levels. Service Availability Periods: 24x7 Availability: expect .9999 is 1 hour per year or 5 minutes per month at worst Problem responsiveness: CJIS cannot be down for more than 30 minutes at a time. Service Consumer Requirements / Prerequisites What, if anything, must a consumer/customer have in place in order to use the service? CJIS users must meet all of the security and policy requirements for obtaining and using the information, which includes training on the system and the CJIS security requirements. What policy requirements must the customer agree to in order to gain access? Cost / Funding Model How is the service funded? ITO is funded through special revenue accounts and general fund appropriations. Technology This section describes the technology components of the service, focusing on the infrastructure required by the provisioner to deliver it to customers. Core Competency Evaluation ITO staff are primarily responsible for the support and maintenance of CJIS. Efficiency Analysis Is this service characterized by economies of scale? Are the fixed costs large in proportion to the overall costs (i.e., do the costs per user decline as the number of users increase)? Factors to examine include: Are large capital investments required to provide the service? Yes, the agency maintains a data center, network, and high levels of security, and provides high availability. Is the underlying software or hardware infrastructure subject to volume discounting? Yes Is the service commoditizedin other words, are there fairly standard functional requirements? No Is there an available business partner providing the service to an equal or greater number of users, with equal or greater service levels, at equal or lower cost? No security requirements for the Department of Public Safety preclude any chance to outsource much of the application development provided by the bureau. What specifically could be done to improve the efficiency of the service? ITO staff provides a continuous improvement policy they have performance and customer reviews and they look for innovative solutions for resolutions to development issues. What specifically could be done to improve the effectiveness of the service?     Service Description: Version: Date Prepared: Page  PAGE \* MERGEFORMAT 3 of  SECTIONPAGES \* MERGEFORMAT 3 ;LMNOtu|   % & ' ( ? @ ymemyy]yT]memh.5^JaJh.^JaJhJ^JaJjhJU^JaJh=^JaJhU^JaJhS6CJ^JaJhK6CJ^JaJh.hU6CJ^JaJ$jh.hU6CJU^JaJh.CJ^JaJh=hU:5CJ^JaJhnP5CJ^JaJh=ha5CJ^JaJh=hU5CJ^JaJMN   & ' < 9 L  _ &s& !  ! gd.$a$gd.@ A B ^ _ ` a m n o ߵu_ߵM#jwh_:UmHnHu*jh kh_:0JUmHnHu'hRh_:CJOJQJaJmHnHuh?gsmHnHu#j}h_:UmHnHujh_:UmHnHuh_:mHnHu*jh kh_:0JUmHnHuh_:mHnHuh kh_:0JmHnHu$jh kh_:0JUmHnHu        6 7 8 9 : ; < = > Z [ \ ] h i j ˬˡu_ˡM#jkh_:UmHnHu*jh kh_:0JUmHnHuh?gsmHnHu#jqh_:UmHnHujh_:UmHnHuh_:mHnHu*jh kh_:0JUmHnHuh_:mHnHuh kh_:0JmHnHu'hRh_:CJOJQJaJmHnHu$jh kh_:0JUmHnHu    3 ӿӱӱuӿӱ_ӱ*jh kh_:0JUmHnHu#jeh_:UmHnHuh_:mHnHu*jh kh_:0JUmHnHuh_:mHnHuh kh_:0JmHnHu'hRh_:CJOJQJaJmHnHu$jh kh_:0JUmHnHujh_:UmHnHuh?gsmHnHu3 4 5 6 7 8 9 : ; W X Y Z s t u ttbL*jh kh_:0JUmHnHu#jYh_:UmHnHuh_:mHnHu*jh kh_:0JUmHnHuh_:mHnHuh kh_:0JmHnHu'hRh_:CJOJQJaJmHnHu$jh kh_:0JUmHnHuh?gsmHnHujh_:UmHnHu#j_h_:UmHnHu     * + , F G H I J K L M N j k l 涢uc涢M*jh kh_:0JUmHnHu#jMh_:UmHnHu*jh kh_:0JUmHnHuh_:mHnHuh kh_:0JmHnHu'hRh_:CJOJQJaJmHnHu$jh kh_:0JUmHnHuh?gsmHnHu#jSh_:UmHnHujh_:UmHnHuh_:mHnHul m x y z      ! " ԳŨߋucŨߋ#jA h_:UmHnHu*j h kh_:0JUmHnHuh_:mHnHu'hRh_:CJOJQJaJmHnHuh?gsmHnHu#jG h_:UmHnHujh_:UmHnHuh_:mHnHuh kh_:0JmHnHu$jh kh_:0JUmHnHu" # $ = > ? Y Z [ \ ] ^ _ ` a } ~  ɾ~u_ɾM~#j5 h_:UmHnHu*j h kh_:0JUmHnHuh_:mHnHu'hRh_:CJOJQJaJmHnHuh?gsmHnHu#j; h_:UmHnHujh_:UmHnHuh_:mHnHuh kh_:0JmHnHu$jh kh_:0JUmHnHu*j h kh_:0JUmHnHu  !"#$%&'(DEFGQRSmnopqrҿ败t^败L#j)h_:UmHnHu*j h kh_:0JUmHnHu'hRh_:CJOJQJaJmHnHuh?gsmHnHu#j/ h_:UmHnHujh_:UmHnHuh_:mHnHu$jh kh_:0JUmHnHu*j h kh_:0JUmHnHuh kh_:0JmHnHuh_:mHnHurstu !"ʫʠt^ʠL#jh_:UmHnHu*jh kh_:0JUmHnHuh?gsmHnHu#j#h_:UmHnHujh_:UmHnHuh_:mHnHu*jh kh_:0JUmHnHuh_:mHnHuh kh_:0JmHnHu$jh kh_:0JUmHnHu'hRh_:CJOJQJaJmHnHu"#$%&'(5_`auAB12ӿyqmiaYaQamIAIh(h*E&6h(hR6h(h=6h(hVm6h(hK6hShRh(h.6#h(ha6CJOJQJ^JaJh.h(h9^6h(hNU6h(ha6h9^h.^JaJjhJU^JaJ'hRh_:CJOJQJaJmHnHu$jh kh_:0JUmHnHujh_:UmHnHuh?gsmHnHu&(5auB*BMgd(gd(gdJ~gdRgdKgd"gdR[$gd_:gd9^gd.gd.2EF )*ABdeGH01269HûûǯǯûǯǧϟϚ˯˖ϧNJhSh(h/6h= h"6h(hM6h(h|6h#<h(h#<6h(hS6hHh(h/h(hVm6h(h=6hhhRh(hR6h(ha6h(hJ~66eH X$d-DM \$a$gd=gd( 7$8$H$gdVmgdSgd(gd.gd/gd(FGXnostw `x}  ?㽯ӧӧӟ۟ӗӟӏwowowkۧh3h(h36h(hS6h=h/h(hJl6h(h=6h(hT/6h(h6h(h6h(h(56^JaJ+h(h9^56B*^JaJmH phsH h(hJI6h(h&66h(h(h&66^JaJh(hVm6^JaJ*}Ao{ K!V!! "W"k"B###K$$^gd & Fgd*=gd*=gd*=gd*=gdJlgd3gd3 & Fgd/gd.?@z { I!K! " "T"U"V"W""##B#F#^#_###############F$G$J$$$$$$O%Q%ǿǿӣӟӛӗӣӣhvJh(h6h(h=6hhh_:hVh(h*=6h(hJl6h(h6h(hT/6h(h&66h(h*=h(ha6h(ha6^JaJhhJlh3h(h_:63$R%%9&&5'7'8':';'='>'@'A'B'C'D'E'F'G'H'I'J'K'L'M' & Fgd^gd & FgdJlQ%R%%%%%9&<&=&J&K&&&&5'6'8'9';'<'>'?'A'B'C'D'E'F'G'H'I'J'K'L'M'N'O'e'f'''''''''Ĺh 6CJaJmHnHu jhJh6CJUaJhJh6CJaJh=6CJaJh hJhh h5jh5Uh(h6h(h&66hEh(hE6h(hT/6h(hJl6h.M'N'O'f'''''' & Fgd  ! gdxgdgdJ''''''''''hEh5hhJh6CJaJh 6CJaJmHnHuh6CJaJjh6CJUaJ z+p,p-p.p1h/R 4567:p/ =!"#$% ,1h/ =!"#$% C0P&P1h:pJ/ =!"#$% Dp}DyK _Toc318988126}DyK _Toc318988126}DyK _Toc318988127}DyK _Toc318988127}DyK _Toc318988128}DyK _Toc318988128}DyK _Toc318988129}DyK _Toc318988129}DyK _Toc318988130}DyK _Toc318988130}DyK _Toc318988131}DyK _Toc318988131}DyK _Toc318988132}DyK _Toc318988132}DyK _Toc318988133}DyK _Toc318988133}DyK _Toc318988134}DyK _Toc318988134}DyK _Toc318988135}DyK _Toc318988135}DyK _Toc318988136}DyK _Toc318988136}DyK _Toc318988137}DyK _Toc318988137}DyK _Toc318988138}DyK _Toc318988138}DyK _Toc318988139}DyK _Toc318988139}DyK _Toc318988140}DyK _Toc318988140}DyK _Toc318988141}DyK _Toc318988141}DyK _Toc318988142}DyK _Toc318988142^ pp002 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH H`H )`NormalxOJQJ_HaJmH sH tH R@R . Heading 1$<@&5CJ KH \^JaJ T@T R Heading 2$<@&56CJ\]^JaJDA D Default Paragraph FontRiR  Table Normal4 l4a (k (No List &@& JpTOC 1.@. JpTOC 2 ^6U`6 J0 Hyperlink >*B*ph4@"4 JHeader  !4 @24 JFooter  !H@BH 9^ Balloon TextCJOJQJ^JaJ:@R: NU Footnote TextaJDoaD NUFootnote Text CharOJQJ@&`q@ NUFootnote ReferenceH*N^@N T/0 Normal (Web)dd[$\$ CJOJQJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] (V|VV @ 3 l " r"2?Q%'' "$&(*&$M''!#%')Nt'?@`n79:<\i 4679Yt+GIJLly#>Z\]_!#$&FRnpqs!#$&U X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%̕Rjlq!B@ @H 0(  0(  B S  ? _Toc318988126 _Toc318988127 _Toc318988128 _Toc318988129 _Toc318988130 _Toc318988131 _Toc318988132 _Toc318988133 _Toc318988134 _Toc318988135 _Toc318988136 _Toc318988137 _Toc318988138 _Toc318988139 _Toc318988140 _Toc318988141 _Toc318988142(a B AKW 4t L  nUjn:i7t+Jy>]$Rq$4578:;=>@AMn:i7t+Jy>]$Rq$45AM;L''ttuu  B H CCFGoswx  ?@  FF9<45588A;L'_`[\  XYkl"#~EF'ttuu  B H CCFGoswx  ?@  FF9<455788:;=>@AMOOdem.3ı4R'D\`S6!0&< Hw~ ! * B -m + [, T ;) 9  wC (_:`~exD1'._1 +9@f~\6d @Fkb,43mmam{=!E,~ Ie %!=f"{"" W# $ $<$$>$F%On%y%*E&Z&z&2'((H)l)|)Y*+r+*+W+O,=S,3[,V-P-N{-:I/T/*m/wN0 1jq233X35_5 6 6X68c<8r19U:#<| <<4(<`0<)=<S<=S=1h==>,W>n>u>?>*?s7?=V?@@a@Vo@S A"Bt(BQaCD.DE'E-EN[F;GpG)H1HrHwHK I3IPIYJwJG|J4L M%N,+Nr,NDOI:OdkOmOuO(PuLPnP|Q)Q_OQgQ[1RTRmRT'U;UNUVUVVW;W{tW,eXipX"AYEZ8[R[1\?\t\@8]C]I]s^^#^C^(`aaaBb%b2b7ci3d e]eVff.hfgzghh1hRh[iniB6jkdjltjkJlVl~mnn+nG1nqnp| q rs5sLs?gs:u|vhwx~w%xHxWIx~zx]hyz2fz ||0|qd| 8}T}DF~P8|'*:!d L /DIe]:iU)`oR CVd__'u/fgrp dqA%F#+-dxK*+*=!<S|o=Vh\v}B]tl(*R}^')bs(gQ J5yt R{ x*+s %%X7u#] h,4l-op:\ue"$xemuVhpxy{7=unqwpC@#JIQoX~)/NW4jZvJRk*IV{X8MKZw# Z!QNd)^ *@`B#Nda<=3?EDgmJ~9:ys~/J`p(mr2R\%{ 0?rKpd &-)R)Y,Tcnd$=HD  B:TDs%"rS_!2mykyr|=Nf\pRM]ftcYh,i(Gw8qz7e@%e>a;U%u0nH7i% 8'-&6VmHJA/zy x0L;R("4SZRh*(H4qn-W%3 @_y#A6=:EZgz%}9^R.\`&0kJpx:'>*57@@UnknownG*Ax Times New Roman5Symbol3. *Cx Arial7.@ Calibri5. .[`)Tahoma?= *Cx Courier New;WingdingsA$BCambria Math"1hzGzG88Y4&&2QX?U6!xx $      Oh+'0 px    Normal.dotm1Microsoft Office Word@@Z2@Z2՜.+,D՜.+, `hpx  8&  Title 8@ _PID_HLINKSATf2h_Toc3189881422b_Toc3189881412\_Toc3189881402V_Toc3189881392P_Toc3189881382J_Toc3189881372D_Toc3189881362>_Toc31898813528_Toc31898813422_Toc3189881332,_Toc3189881322&_Toc3189881312 _Toc3189881302_Toc3189881292_Toc3189881282_Toc3189881272_Toc318988126  !"#$%&'()*+-./012346789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWYZ[\]^_abcdefgjklopRoot Entry FP 2nData ,1Table5DWordDocument VSummaryInformation(XDocumentSummaryInformation8`MsoDataStorep2 2BSTA05JGB3DFPA==2 p2F2Item  PropertiesSW0ZJCPX4==2 p2 2Item  Properties UCompObjr    F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q