CIDMS Flashcards

1
Q

CIDMS

A

Case Information Database Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

______ is the CASE MANAGEMENT INFORMATION SYSTEM of the PNP specifically designed for Investigators in managing case files/folders

A

CIDMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The CIDMS acronym stands for …

A

Case Information Database Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A program initially used by ____ that was enhanced by ____ thru the technical assistance of _____

A

CIDG
DIDM
ITMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

First, it was a LAN/stand-alone, now it is a ______ information system using SQL as back-end and visual basic.net/PHP as front-end.

A

Web-Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Web-based CIDMS domain name is ______________

A

www.pnpcidms.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIDMS was developed By gathering inputs from the end-users - _________ from Police Stations (NCRPO & Regions)

A

Investigators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIDMS was developed through Inputs from Investigators/Case Monitoring Personnel from DIDM, CIDG, WCPC, AKG, ACG, AVSEGROUP, MG.

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIDMS was developed through Inputs from _____ personnel, subject-matter experts and forensic examiners from HPG-Motor Vehicle Clearance Division, CSG-Firearms and Explosives Office and Crime Laboratory

A

evidence concerned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CIDMS was developed
Inputs from Legal Officer of DIDM (detailed, from Legal Service)

  • Inputs from Information Technology Officers of DICTM and ITMS
  • And also from learning about information systems of other government agencies (like _______ E-courts) and other countries (like the TIMS of Albania - was presented to the PNP).
A

Supreme Court’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Objective of CIDMS

A

CIDMS is a tool for Investigators to;

  • Easily access and manage case files/folders
  • Have a systematic recording by digitizing case files/folders
  • Backup case folders in case we lose the case folder because of flooding, earthquake, fire and so on.
  • Avoid voluminous records
  • Cross-reference various cases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What case Information

can we store in CIDMS?

A

•Facts about the incident
•Facts about how the incident was reported
•Law enforcement officers involved
•Civilian persons Involved
•Pieces of Evidence
•Information on the filing and status of the case in
–Prosecutor’s Office
–Court(s) of Law
•Electronic copy of the case files or the entire case folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why CIDMS/NGIS?
•Technological advancement

  • Criminals becomes smarter and more organized
  • Crimes becomes more complex and sophisticated
  • Increase of crimes in which Information Technology is used (drug/human trafficking, identity theft, terrorism, cybercrimes, telecommunication fraud etc.)
  • Need for Law Enforcement to adapt to the challenge of modern day policing (fight back)
  • If Information technology is a means to commit a crime, it can also be a means to fight crime.
A

Why CIDMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • The ___1____ is easy to access but hard to secure.
  • ______2______ can only access the Surface Web (shallow 20%).
  • The ____3____ (80%) is anything that a search engine can’t find.
  • The _____4____ is classified as a small portion of the Deep Web intentionally hidden, inaccessible through standard web browsers. It is being used to propagate illegal activities like selling illegal drugs online, money laundering in the advent of virtual currency (bit coins).
A
  1. World-Wide Web
  2. Conventional web browsers
  3. Deep Web
  4. Dark Web
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Accessible, Indexed

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Accessible, non-indexed

A

Deep Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Restricted, Non-indexed

A

Dark Web

18
Q

Contains 90% of the information on the internet, but is not accessible by Surface Web crawlers.

A

Deep Web

19
Q

A part of the Deep Web accessible only through certain browsers such as Tor designed to ensure anonymity.

A

Dark Web

20
Q

All Incidents
(Crime & Non-Crime)

Initial Report (5Ws/1H)

Desk Officer/
Crime Registrar/
Crime Analyst/ Investigator

Starting History
(Update Status)

Developed to digitize blotter book, aid in UCPER. To Analyze Crime situation using Crime Analysis in a given area to enhance police mobilization / deployment and aid in crime prevention.

A

CIRAS

21
Q

Crimes subjected to investigation

Entire Case Folder (Incident, Investigation, Prosecution Resolution, Court Decision)

Investigator on Case / Case Monitoring Personnel / C, Invest

Case History

Developed for PNP’s need of a unified Case Management System, for cross-referencing cases, case folder backup / repository, case folder monitoring reports (status/stats)

A

CIDMS

22
Q

Web CIDMS POLICIES

Account activation will depend on _______signed by Head of Unit. No endorsement = No account activation.

A

Unit endorsement letter

23
Q

Types of user account

A

Trainer
Encoder
Investigator
Supervisor

24
Q

Can be used for practice and teaching purposes, encoded information while using this type of account will not be treated/counted as actual data.

A

Trainer

25
Q

Limited to add case and inquiries of own encoded case

A

Encoder

26
Q

Add, update cases and inquiries

A

Investigator

27
Q

Inquiries (viewing of all cases nationwide)

A

Supervisor

28
Q

Web CIDMS POLICIES
For Investigator/IOC that will be reassigned, outgoing IOC must properly ____________ records to incoming IOC with supervision of supervisors (Chief Investigator).

A

turn-over hard-copy of case folder

29
Q

How do we turn-over case folder records in CIDMS?

A

Turn-over of case folder records on Web CIDMS will be dependent on endorsement letter signed by Head of Unit.

30
Q

Web CIDMS POLICIES

What data are we storing in CIDMS?

A

Content of the entire Case folders (all cases subjected to an investigation either cleared, solved or unsolved. Either it has been filed in the prosecutor’s office or not. And either filed in a court of law or not).

31
Q

What is the recommended minimum hardware and software requirements of CIDMS?

A

Intel Core i3 processor or equivalent or higher
2 gigabytes RAM memory or higher
160 gigabytes hard disk space
High speed Automatic Document Feeder/ADF scanner (for scanning case folders in pdf format)
Windows 7 Operating System or higher
MS Office
Adobe Acrobat Reader

32
Q

How can we upload scanned documents if we don’t have a scanner?

A

You can use mobile apps like CamScan (available for iphone and android) to take a photos of documents, save it in PDF format and transfer it to your pc for uploading in CIDMS.

33
Q

What is the order of priority with respect to cases that will be encoded into the CIDMS?

A
Task Force USIG (TF USIG) cases (Killings of Activist and Media Practitioners, Death of Foreign Nationals, Labor-Related Killings and Enforced Disappearances)
Task Force Judges, Prosecutors and IBP Lawyers (TF JPL) cases
Task Force Elected Government Officials (TF EGO) cases
Drug related cases 
Election-Related Incidents (ERIs)
Environmental Cases (illegal logging, illegal mining, illegal fishing)
Torture cases
Committee on Legal Action (COLA) cases 
Other Heinous and Sensational cases
All other cases subjected to an investigation
34
Q

How many cases need to be encoded into the CIDMS per day?

A

A minimum of two (2) cases (case folders) per day

35
Q

What type of file must only be attached into the e-Docs portion of CIDMS?

A

All types of document files (Legal, Forensic, Photos of crime scene/evidences) can be attached to the CIDMS.

Files need to be converted to PDF format before attaching to reduce the size of the files, save space and speed-up the attaching process.

36
Q

Who is the end-user/main user of the CIDMS?

A

The IOC

37
Q

Who are the personnel needed to be trained in the use of CIDMS?

A

IOC as end-user/main user
Chief, Investigation as supervisor
Crime Registrar for continuity
IT Officer/PNCO for technical assistance in the cascading

38
Q

What Offices are primarily responsible (OPR) in the implementation and cascading of CIDMS?

A
NHQ – DIDM
PRO – RIDMD
DISTRICT/CPO/PPO – DIDMD/CIDMD/PIDMB
CPS/MPS/STN – IDMS
NOSUs 
39
Q

What is the task of the IT Officers/PNCOs in the implementation and cascading of CIDMS?

A

Their task is only limited to providing technical assistance when requested by the RIDMD/DIDMD/CIDMD/PIDMB/IDMS or NOSUs. Hence, no IT Officer/PNCO shall cascade the CIDMS without the request for technical assistance and presence of the OPR.

40
Q

Where can we lodge any inquiries on the investigation and technical aspect of CIDMS?
Investigation Aspect:

A
NHQ – DIDM
PRO – RIDMD
DISTRICT/CPO/PPO – DIDMD/CIDMD/PIDMB
CPS/MPS/STN – IDMS
NOSUs
41
Q

Where can we lodge any inquiries on the investigation and technical aspect of CIDMS?

Technical Aspect:

A

PRO/District/NOSU – IT Officer/PNCO