Laserfiche WebLink
<br />After the dispatch function is completed, the accuracy of the location information relative to a <br />call provides: <br />· Improved and more accurate statistics; <br />· Better crime pattern information; <br />· Improved operational efficiency and work load measurements; and <br />· Better operational plans. <br /> <br />Thus the entire approach to the geo-fiIe must not be only directed toward the dispatch function <br />and the needs of the dispatchers, but must take into account all activities within the agency. <br /> <br />Secu.'ity . The prevention of unauthorized use of data collected in the public safety area is of <br />utmost importance in any system. In the software, data may be totally protected from <br />unauthorized use, or it can be limited in various ways. The softwar~ uses the security system <br />designed within the IBM hardware operating system and also provides additional security <br />measures built into the software so that only authorized individuals are allowed to utilize the <br />software or certain portions of the software. This authorization decision is an administrative one <br />controlled by the user agency and the system manager. It is not a limitation imposed by the <br />hardware or software architecture. It is a flexible capability which allows unlimited combinations <br />to be made to cover all situations in this sensitive area. The IBM security mechanism allows for <br />defining which users have access to which files. Through the use of the data base system, <br />management personnel can decide to provide for limited access to certain items of information <br />within the data system. In its installation approach, ALR provides time for initial consulting on <br />this feature. During this phase, the security mechanism is defined and prepared, and can then <br />be implemented at the time of installation. <br /> <br />Menu D.'ivell . The data base is updated through the Incident file maintenance programs. <br />Options are provided within these programs to allow access to each file. Thus, the operator does <br />not have to scroll through or call several programs to update the data base. By entering a case <br />number, the operator may access and update all files related to a case. <br /> <br />In addition to the above feature, a menu generation program is provided which allows the user <br />to easily tailor the menus to each user group. A user, therefore, will only see functions to which <br />he is authorized on his/her menu. <br /> <br />The menu system also provides the capabilities to restrict access to certain pieces of information. <br />This provides the user with the capability to maintain a security system which truly reflects the <br />agency's policies. <br /> <br />Because of the flexible nature of the software and the menu system, many users develop their <br />own queries and programs which they place on a user's menu. Also, if a government utilizes <br />other organizational wide systems, the menu system allows the installation to have the flexibility · <br />necessary to add such items to its menus. <br /> <br />Table Driven. Specific terminology and code tailoring for a user agency are accomplished by <br /> <br />4 <br />