1 / 56

From time of arrest…

From time of arrest…. O ffender B ased T r acking S ystem. …to release from probation. Welcome to OBTS Training!. Ground Rules. Agenda. What is the Offender-Based Tracking System?.

kaya
Download Presentation

From time of arrest…

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. From time of arrest… Offender Based Tracking System …to release from probation

  2. Welcome to OBTS Training!

  3. Ground Rules

  4. Agenda

  5. What is the Offender-Based Tracking System? An information system which provides a repository of offender, case, and arrest data from existing Agency criminal justice information systems.

  6. Why was the OBTS Developed? Investigation and Research One single repository Near Real Time

  7. Who Uses the OBTS? Main Customers:

  8. Current Uses

  9. State of Connecticut (adult) offender data only Examples: Offender classifications Comprehensive case status Profiles on offenders Court criminal histories Arrest data Information regarding probation and parole Offender status What Kind of Data Can I Expect to Find?

  10. What Kind of Data is NOT Found? • No National Crime Information Center (NCIC) data • No National Law Enforcement Telecommunications System (NLETS) data • No COLLECT data • No old format rap sheet data • No manual files in Master Name Index (MNI) and Computerized Criminal History (CCH) • No centralized infractions bureau historical data • No historical data from Protective Order Registry (POR) and Paperless Re-Arrest Warrant Network (PRAWN)

  11. Planned Future Uses for OBTS • Inclusion of No Contact Orders – target date TBD • Foreign Orders (Out of State Protection Orders) • Inclusion of Photo/Mug-Shot data and DNA information • Sex Offender Registry (SOR) and Case Notes (Board of Pardons and Parole) are in use, but not currently interfaced with OBTS • The interface to receive Probation and Bail information from CMIS (Case Management Information System) is being planned; currently not in production • The new Sentence and Time Calculation System from DOC is currently being tested

  12. Planned Future Uses for OBTS Making OBTS Even More Effective: Providing Notifications to inform authorized agencies of the addition of significant data Providing a mechanism to exchange information between existing criminal justice information systems Enabling future criminal justice information initiatives to integrate with existing CJIS systems 11

  13. Agenda 12

  14. How Does the OBTS Collect Data? v 5.1.3

  15. What is a CJIS Business Event? … a decision or action that generates “Criminal Justice Enterprise Information” and causes the exchange of that information

  16. Yellow Boxes = Judicial Legacy Source Systems Judicial Computer Systems: • Criminal and Motor Vehicle System (CRMVS) • Protection Order Registry (POR) • Paperless Re-Arrest Warrant Network (PRAWN) • Centralized Infractions Bureau (CIB) • Case Management Information System (CMIS) (future interface)

  17. Uniform Arrest Record (UAR) Misdemeanor /MV Summons, and Complaint (MSC) Arrest Complaint Ticket Arrest Charging, Continuance, Re-Arrest, Disposition Protective, Standing Criminal Restraining, and No Contact Orders Superior Court Bail Decision, Centralized Infractions Bureau Case Disposition Adult Probation and Bail Commission Community Supervision Erasure Examples of Judicial Branch Business Events

  18. State Police Bureau of Identification (SPBI) Light Blue = Public Safety Legacy Source Systems DPS Computer Systems:

  19. Master Name Index (MNI) Computerized Criminal History (CCH) Examples of DPS Business Events

  20. Offender Based Information System (OBIS) Sentence and Time Calculation (STC) (currently being tested) Green = DOC Legacy Source Systems DOC Computer Systems:

  21. Pre-Trial, Post-Conviction Incarceration DOC Release, DOC Community Supervision DOC Offender Transfer, Escape Extradition, Death Examples of DOC Business Events

  22. “Who Provides What?” Chart OBTS Overview – Data Source

  23. Enter and maintain the highest quality of data in the Legacy Source Systems Enter data in the Legacy Source Systems in a timely manner Be aware of current known issues Ensuring the Integrity of OBTS Data: Your Responsibilities

  24. Matching Exercise Time for Review! Write the appropriate alphabet letter in front of each question.

  25. Question 1 From which state branches or agencies does the OBTS receive offender address information? K. DPS DOC Judicial Branch

  26. Question 2 What is the information system which provides a repository of offender, case, and arrest data from existing agency criminal justice information systems? L. Offender Based Tracking System (OBTS)

  27. Question 3 Give 4 examples of data sources that are not included in OBTS. F. NCIC NLETS COLLECT SOR

  28. Question 4 Give an example of a criminal justice business event. C. Uniform Arrest Record (UAR)

  29. Question 5 True or False? OBTS identifies the source system of all data to the user. D. True

  30. Question 6 True or False? OBTS contains information on juveniles who are detained and/or processed through Juvenile Court. H. False

  31. Question 7 When did OBTS go live? I. July 2004

  32. Question 8 This information is currently not included in OBTS but there are future plans to do so. B. No Contact Orders Photo/Mug Shot Data DNA information

  33. Agenda 32

  34. State Statutes Who is Authorized to Use OBTS? OBTS Data is Available to Criminal Justice and Other Agencies, as defined in CGS subsection (b) of section 54-142g http://www.cga.ct.gov/2009/pub/chap961a.htm#Sec54-142g.htm 33

  35. Who is Authorized to Use OBTS? 34

  36. Defined by Statute Computer System Security What You CanSee and Access = Your Job Role

  37. Security Levels: “Who Can See What” Chart

  38. OBTS Case Types

  39. Who Can See What?Access vs. Dissemination: There’s a Difference! IT Support OBTS

  40. For Forms and Instructions:See the CJIS Portalhttp://www.cjis.ct.gov Security Procedures • Use OBTS on COLLECT-Certified Workstations! • For Non-COLLECT Certified Workstations, do the following: • Complete a CJIS-2 Security Compliance Assessment Form and submit to the CJIS Support Group • When approved, complete a CJIS-3 Security Compliance Certification Form and submit to the CJIS Support Group

  41. 3 Rules Regarding Access and Dissemination of OBTS Data • Must be for criminal justice and/or law enforcement purposes only • Must be accessed/disseminated only for the performance of your job duties • Access and dissemination of OBTS data must be in accordance with your Agency’s existing policies

  42. CGS Sections 29-11 through 29-16, 53, 54 Under no circumstances can OBTS data be used for: • Personal Use or Curiosity • Private Investigation Work • Personal Profit or Gain • OBTS Users must not perform queries for: • Private investigators • Freedom of Information Act (FOIA) requests • Other State or Municipal Agencies (if not in the performance of your job duties) • The Public (if not in the performance of your job duties) • Volunteer Agencies or Organizations, such as school or sport-affiliated organizations, etc.

  43. What Do You Think Happened? The individual was terminated and criminally prosecuted.

  44. What Do You Think Happened? The individual was terminated, arrested, and criminally prosecuted.

  45. What Do You Think Happened? The individual was verbally reprimanded and a letter placed in their employment file.

  46. You are accountable for queries made with your User ID Do not share your User ID or password Be sure to log-off before leaving your computer Inquiry Logs: Date/Time of Inquiry (Query) was submitted Reason and the Requestor ID (if entered) Search Criteria for the Inquiry, including any Identifiers Audit Trails 45

  47. Proposed Sanctions for Misuse • 1st Offense: Agency imposes penalties • 2nd Offense: 30-day suspension of OBTS access • 3rd Offense: Termination of OBTS access rights; can be reinstated upon successful appeal to CJIS Governing Board Note: Offenses can result in criminal charges. Agencies can impose greater penalties than those indicated.

  48. Agenda 47

  49. How to Use OBTS Demonstration 48

  50. http://www.cjis.ct.gov 49

More Related