ca.portal.admin

Re:EXTERNAL: IDMS app age?

Discussion created by ca.portal.admin on Aug 27, 2010
Hello IDMS community,



We are interested in the longevity of IDMS applications ... when did your c=
urrent IDMS apps go into production?

Are they old enough to drive? To vote? To go to a 20th reunion? To remem=
ber the 80s? What do they do?



And are you/they planning application retirement? 5 years or less, 5-10 ye=
ars, never, don't know?



Details are great and if you want to keep this under the radar just email m=
e directly at greg.beedy@ca.com.



Thanks, Greg





Greg Beedy
CA
Sr Principal Product Manager
Tel: +1 508.628.8024
Mobile: +1 508.654.4407
Greg.Beedy@ca.com
<mailTo:Gregory.Beedy@ca.com> <http://www.ca.com/>
"
IDMS 3rd-party providers forum
IDMSVENDOR-L@LISTSERV.IUASSN.COM
SMTP
IDMSVENDOR-L@LISTSERV.IUASSN.COM
IDMSVENDOR-L@LISTSERV.IUASSN.COM
SMTP








Normal

Normal
Re: IDMS app age?
"Here's a list of Applications from about 4 years ago - probably not complete but covers major applications - most of the applications were developed in the 1990 to 1999 time frame - we are still developing new ADS applications, both green screen and front-ended by Java apps - sorry I couldn't locate a more complete list - there have been some interesting additions since this list was made -HTH - cheers - Gary

The Justice Information System comprises the following online applications. Current size of the applications consists of over 5,000 programs and 3 million lines of code. All Agency subject databases are represented in a single physical IDMS schema - the JIS Central databases are shared by all Agencies - there are rules of engagement and auditing for adherence for data sharing between agencies.

Police Department

Incident Report: Records Police Incident Reports, including offence details. lost property, victim details.
Apprehension Report: Records Police Apprehension reports, including offender details, offence details, co-offenders.
Missing Person Information: Records missing person details.
Juvenile Justice: Supports the administering of Juvenile Justice as required by the Young Offenders Act. Registers formal cautions, family conference referrals, and youth court referrals after the juvenile has been apprehended.
Modus Operandi: Maintains tables used to record modus operandi data.
Physical Description: Maintains physical description reference data.
Property Tracing: Records details of stolen property.
Crime Analysis: An investigative tool which allows the database to be queried with any combination of the information stored.
Warrant Information: Manages the issuing, processing, serving, executions and maintenance of warrants.
Court Orders: Records Courts Orders that restrict and retain an individual.
Offender History: Records criminal history details from offender history cards held at the Records Branch.
Licensing and Gaming: Records the involvement of persons in Gaming activities.
KDT: Provides a means of enquiring on data via the KDT portable data terminals
Area Codes: Allows coding of all central addresses with the Census Collector District to provide a mechanism for reporting by area.

Correctional Services

Prisons: Records prisoner movements and details, including sentence details
Community Corrections: Records details of Supervision, Community Service Orders and Bonds, and Fine Option Community Service Agreements.
Statistical Services: Extracts data to a local computer for statistical reporting, trend analysis and ad hoc queries.
Prisoner Visits: manages lists of permitted, barred, warnings and etc regarding visits to prisoners
Mail: logs incoming and outgoing mail to prisoners
Logging: Logging of data access for audit purposes, in preparation for privatisation of Prisons.

Family and Youth Services

Young Offenders Panels: History of juvenile offenders' appearances before Panels before 1993.
Young Offenders Mandates: Records receipt of mandates from the Courts, related outcomes and any payments.
Young Offenders Secure Care: Manages details of children in detention.
Community Based Services: Manages placement of offenders into community service, personal supervision and other programs.
Client Information: Provides data about clients to FACS officers
Placements and Payments: Manages placement of children into care and registers care givers. Makes payments for substitute care.
Audit Trails: Monitors data access.
MIDAS: Provides reports and ad hoc statistical queries from extracted data.

Office of Crime Statistics

Law Codes: Details of South Australian and Commonwealth Acts and Regulations.
Offence Codes: Method of classifying Laws into groups for reporting purposes.

JIS Central Applications

Office / Officer: Records officers, Departmental Offices, Institutions and Organisational Units - integrated with security and real-time access permissions
DAMS: Provides security by managing users access permission and passwords - integrated with Office/Officer
Data Interchange: Enables electronic transfer of data between justice agencies.
Person: Allows identification of individuals
Address: Provides the mechanism for accessing a central address database.
Court Outcomes: Stores court outcome data from Courts received through the Data Interchange.

Gary Cherlet
Justice Technology Services
Department of Justice, SA Government

"""""""" Telephone +61 (0)8 8226 5199
@@ Facsimile +61 (0)8 8226 5311
> Mobile +61 (0)41 333 1613
\/ MailTo:gary.cherlet@sa.gov.au

Gary says: Boycott Apple - the hardware company that puts software companies out of business!
This e-mail message and any attachments are qualified as follows: Addressing: If you have received this e-mail in error, please advise by reply e-mail to the sender. Please also destroy the original transmission and its contents. Confidentiality: This e-mail may contain confidential information which also may be legally privileged. Only the intended recipient(s) may access, use, distribute or copy this e-mail. Individual Views: Unless otherwise indicated, the views expressed are those of the sender, not Justice Technology Services. Computer Viruses: It is the recipient's responsibility to check the e-mail and any attached files for viruses.

Outcomes