CRJU145-Justice Information Systems

Week 7 Lecture

With the advent of technological resources and information, justice administrators are faced with the task of managing that information, the security of the information and the rights of the individuals involved. This module reviews the requirements and ethical dilemma involved.

Legal Issues Affecting the Sharing of Information

28 CFR Part 23 – Criminal Justice History

  • Federal regulation on the use of criminal history
  • Agencies receiving, storing, or disseminating information must have reasonable suspicion that the individual or organization is participating in criminal activity.
  • Cannot collect information on political, religious, or social views unless that information is directly related to criminal activity.


Dissemination of Information

  • “Need to Know”
  • “Right to Know”


Maintenance of Records – Security Requirements

  • Unauthorized Access
  • Intentional Damage
  • Unintentional Damage


28 CFR Part 22 – Confidentiality of Identifiable Research and Statistical Information

Prevents using identifiable research as evidence without the consent of the person the information identifies


Four significant exceptions

  1. Information regarding future criminal conduct
  2. Records from which the identifiable research information was originally obtained.
  3. Records designated as public under existing statutes
  4. Information extracted from records designated as public


Laws Boarding Access and Opportunity for Information Sharing

  • U.S.A. Patriot Act
  • Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Act

Developing an Information Sharing System

Planning

  1. Identifying Stakeholders
  2. Defining Goals and Objectives
  3. Defining Data Elements
  4. Identifying System Evaluation and Reporting Requirements
  5. Security


Implementation

  1. Pre-implementation Activities
  2. Training
  3. Technical Assistance


Maintenance

Organizational Change

Conceptions of the Police Organization and Technology

  1. Questions of Environmental Complexity
  2. Question of Loose Coupling
  3. Questions of Good Faith
  4. Questions of Technology


Rules, Processes, and Routines

  1. Organizational Rules
  2. Organizational Processes
  3. Routines and Tasks

Supplemental resources:

To access this supplemental resource, you must click the downloadable PDF links below.

DOGS, DRONES, AND DEFENDANTS: THE FOURTH AMENDMENT IN THE DIGITAL AGE

Full Text Available By: Clutter, Mason C. George Mason Law Review 2014/04/01, Vol: 21, p557, Database: LexisNexis Academic: Law Reviews

Resources

Pattavina. (2005). Information technology and the criminal justice system. Thousand Oaks, Calif: Sage Publications. Chpt 9-10 p. 195-239


Greene, J. (2000) Community Policing in America. In J. Horney (Ed.) Criminal Justice 2000 Vol. 3) Washington D.C. U.S. Department of Justice p. 299-360