A complete automated package of controls built around the nations largest police departments in places like NY, FL, and the gambling capital of the world.
Reduce payroll expenses while increasing the accuracy of company processes and data. TimeKron is “the” tool to track and to manage all employee time worked.
15 Tips for Compelling Company Updates on LinkedInLinkedIn
LinkedIn has evolved into a platform for content marketing. With more than 225 million members worldwide, professionals are using LinkedIn to become great at what they do by seeking and sharing insights. On LinkedIn, marketers are able to build relationships with professionals by using accurate targeting to share relevant content. LinkedIn Company Updates, shared from your Company Page, are a powerful way to reach professionals with relevant content across devices. We’ve created these 15 tips for compelling company updates to help you drive better results.
For more about content marketing on LinkedIn, visit http://lnkd.in/LIContentMarketing
LegalThings was born from a common pain to almost everyone who has worked in a corporate environment: despite working with smart and organised people, we are still spending too much time on process management and reproduction of the same content.
LegalThings was born from a common pain to almost everyone who has worked in a corporate environment: despite working with smart and organised people, we are still spending too much time on process management and reproduction of the same content.
SoftSol’s IntelliCourt™ case management system empowers courts to meet the constantly increasing demands placed on the justice system. http://www.softsol.com/intellicourt-case-management-system
Maintaining The Digital Chain of Custody By John Patzakis .docxsmile790243
Maintaining The Digital Chain of Custody
By John Patzakis
[email protected]
Employing proper computer forensic processes is the foundation of computer
investigations. Even the best corporate policies for incident response and computer data
preservation can mistakenly allow the mishandling of potentially key computer evidence.
Once compromised, either during the collection or analysis process, the evidentiary
integrity of the data is lost.
Computer investigators must follow four basic steps in order to correctly maintain
a digital chain of custody. These include:
• Physically control the scene, or if conducting a remote network investigation, log
all access and connectivity through an integrated and secure reporting function
• Create a binary, forensic duplication of original data in a non-invasive manner
• Create a digital fingerprint (hash) that continually verifies data authenticity
• Log all investigation details in a thorough report generated by an integrated
computer forensics software application
The Problem of Improper Computer Evidence Handling
Maintaining the integrity of computer evidence during an internal investigation or
incident response is important, especially when computer evidence may be presented in
court. This is true whether human resource personnel suspect that an employee’s
violation of company policies may warrant termination, if IT staff are responding to a
network intrusion, or outside consultants suspect criminal activity that may need to be
reported to authorities. However, the ability to maintain and precisely document digital
contents, including its exact location on the subject media should stand as the
cornerstone of any computer investigation. By not taking steps to preserve the digital
chain of custody, a company is leading itself into an investigation that is compromised
from the beginning.
Such a lax investigation also can make it difficult to later map out the exact
location of electronic evidence on a drive, or to prove who manipulated or created data,
as it is no longer clear if it was the suspect or the investigator who was the last to access
it. In fact, this is the reason that worldwide agencies regulating financial institutions have
mandated incident response plans.
Recent policies, standards, and court decisions strongly establish a compelling
obligation for all types of businesses to preserve electronic data that may be relevant to
a legal matter, audit, etc. On the U.S. legislative front, the Sarbanes-Oxley Act, which
passed in response to the Enron/Arthur Anderson debacle, imposes severe penalties for
the destruction of records, including electronic data. The act expressly prohibits the
destroying records in “contemplation” of an investigation or proceeding. Securities
Exchange Commission rules require retention for six years of all business-related email
and Internet communications sent and received by brokers, dealers and exchange
members ...
Reduce payroll expenses while increasing the accuracy of company processes and data. TimeKron is “the” tool to track and to manage all employee time worked.
15 Tips for Compelling Company Updates on LinkedInLinkedIn
LinkedIn has evolved into a platform for content marketing. With more than 225 million members worldwide, professionals are using LinkedIn to become great at what they do by seeking and sharing insights. On LinkedIn, marketers are able to build relationships with professionals by using accurate targeting to share relevant content. LinkedIn Company Updates, shared from your Company Page, are a powerful way to reach professionals with relevant content across devices. We’ve created these 15 tips for compelling company updates to help you drive better results.
For more about content marketing on LinkedIn, visit http://lnkd.in/LIContentMarketing
LegalThings was born from a common pain to almost everyone who has worked in a corporate environment: despite working with smart and organised people, we are still spending too much time on process management and reproduction of the same content.
LegalThings was born from a common pain to almost everyone who has worked in a corporate environment: despite working with smart and organised people, we are still spending too much time on process management and reproduction of the same content.
SoftSol’s IntelliCourt™ case management system empowers courts to meet the constantly increasing demands placed on the justice system. http://www.softsol.com/intellicourt-case-management-system
Maintaining The Digital Chain of Custody By John Patzakis .docxsmile790243
Maintaining The Digital Chain of Custody
By John Patzakis
[email protected]
Employing proper computer forensic processes is the foundation of computer
investigations. Even the best corporate policies for incident response and computer data
preservation can mistakenly allow the mishandling of potentially key computer evidence.
Once compromised, either during the collection or analysis process, the evidentiary
integrity of the data is lost.
Computer investigators must follow four basic steps in order to correctly maintain
a digital chain of custody. These include:
• Physically control the scene, or if conducting a remote network investigation, log
all access and connectivity through an integrated and secure reporting function
• Create a binary, forensic duplication of original data in a non-invasive manner
• Create a digital fingerprint (hash) that continually verifies data authenticity
• Log all investigation details in a thorough report generated by an integrated
computer forensics software application
The Problem of Improper Computer Evidence Handling
Maintaining the integrity of computer evidence during an internal investigation or
incident response is important, especially when computer evidence may be presented in
court. This is true whether human resource personnel suspect that an employee’s
violation of company policies may warrant termination, if IT staff are responding to a
network intrusion, or outside consultants suspect criminal activity that may need to be
reported to authorities. However, the ability to maintain and precisely document digital
contents, including its exact location on the subject media should stand as the
cornerstone of any computer investigation. By not taking steps to preserve the digital
chain of custody, a company is leading itself into an investigation that is compromised
from the beginning.
Such a lax investigation also can make it difficult to later map out the exact
location of electronic evidence on a drive, or to prove who manipulated or created data,
as it is no longer clear if it was the suspect or the investigator who was the last to access
it. In fact, this is the reason that worldwide agencies regulating financial institutions have
mandated incident response plans.
Recent policies, standards, and court decisions strongly establish a compelling
obligation for all types of businesses to preserve electronic data that may be relevant to
a legal matter, audit, etc. On the U.S. legislative front, the Sarbanes-Oxley Act, which
passed in response to the Enron/Arthur Anderson debacle, imposes severe penalties for
the destruction of records, including electronic data. The act expressly prohibits the
destroying records in “contemplation” of an investigation or proceeding. Securities
Exchange Commission rules require retention for six years of all business-related email
and Internet communications sent and received by brokers, dealers and exchange
members ...
How Authentication, Collection & Reporting Strengthen OSINT's ValueVere Software
The collection, timely analysis and use of open source intelligence (OSINT) can be of immense value to an analyst. Open source information may be indistinguishable from classified information, but based on its source, may not be evaluated as trustworthy. OSINT is inherently challenging, in fact, because the very qualities that make it valuable to operations can reduce its credibility, too. In this white paper, learn how to improve quality, ease of use, and cost savings in OSINT collection.
whitepaper Tool, Equipment and Consumable Management for Construction CompaniesKelly Stark
You're under pressure to trim tool and service costs, while keeping your scheduled commitments. Informing your systems and processes with real-time tool and equipment status visibility can help improve your performance and reduce your costs. Download our latest whitepaper where we answer your tough questions on best practices, technology choices, and ROI
DAELIBS Seeknfind addresses the barriers associated with distance and isolation by collecting, delivering and sharing information in the context of physical location.
WeGoLook | On-demand field service solutionsGoose & Gander
Dispatch an on-demand agent to perform inspections for property, autos, heavy equipment and more with international coverage in the field services industry.
Splunk, Software Tools, Big Data, Logging, PCI, Information security, Cisco Systems, VMware ESX, Regulatory compliance, FISMA, Enterprise architecture, Data center, security software, SCADA, Windows,Unix,Scanners, Citrix, Microsoft Active Directory
Due to increasing security concerns across different industries, such as law enforcement, defense, banking, health care, information technology, and education, the market for computer or digital forensics is witnessing substantial growth. Wavecrest has over 20 years of proven history addressing forensic requirements across various industries. Cyfin is a court-cited, forensic investigation solution capable of significantly reducing case investigative times by allowing you to gather and analyze pertinent evidence in a rapid, cost-effective manner.
Whether you are a large organization with an internal Investigations department or an independent Forensics Investigator, you will experience a significant increase in productivity which equates to decreased cost per investigation. In addition to identifying evidence faster with Cyfin, pinpoint supporting relevant activity that may be of value and have more time to focus on the actual investigation.
Electronic Document Workflow System – Enovatio Workflow is a solution supporting automation of business processes and productivity of employees. The solution provides security and control of key data. The system is designed based on technologies providing stability and scalability of the solution.
Test the system yourself - free.
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordinary And Special Businesses And Ordinary And Special Resolutions with Companies (Postal Ballot) Regulations, 2018
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
More Related Content
Similar to Ace Evidence Management System Brochure
How Authentication, Collection & Reporting Strengthen OSINT's ValueVere Software
The collection, timely analysis and use of open source intelligence (OSINT) can be of immense value to an analyst. Open source information may be indistinguishable from classified information, but based on its source, may not be evaluated as trustworthy. OSINT is inherently challenging, in fact, because the very qualities that make it valuable to operations can reduce its credibility, too. In this white paper, learn how to improve quality, ease of use, and cost savings in OSINT collection.
whitepaper Tool, Equipment and Consumable Management for Construction CompaniesKelly Stark
You're under pressure to trim tool and service costs, while keeping your scheduled commitments. Informing your systems and processes with real-time tool and equipment status visibility can help improve your performance and reduce your costs. Download our latest whitepaper where we answer your tough questions on best practices, technology choices, and ROI
DAELIBS Seeknfind addresses the barriers associated with distance and isolation by collecting, delivering and sharing information in the context of physical location.
WeGoLook | On-demand field service solutionsGoose & Gander
Dispatch an on-demand agent to perform inspections for property, autos, heavy equipment and more with international coverage in the field services industry.
Splunk, Software Tools, Big Data, Logging, PCI, Information security, Cisco Systems, VMware ESX, Regulatory compliance, FISMA, Enterprise architecture, Data center, security software, SCADA, Windows,Unix,Scanners, Citrix, Microsoft Active Directory
Due to increasing security concerns across different industries, such as law enforcement, defense, banking, health care, information technology, and education, the market for computer or digital forensics is witnessing substantial growth. Wavecrest has over 20 years of proven history addressing forensic requirements across various industries. Cyfin is a court-cited, forensic investigation solution capable of significantly reducing case investigative times by allowing you to gather and analyze pertinent evidence in a rapid, cost-effective manner.
Whether you are a large organization with an internal Investigations department or an independent Forensics Investigator, you will experience a significant increase in productivity which equates to decreased cost per investigation. In addition to identifying evidence faster with Cyfin, pinpoint supporting relevant activity that may be of value and have more time to focus on the actual investigation.
Electronic Document Workflow System – Enovatio Workflow is a solution supporting automation of business processes and productivity of employees. The solution provides security and control of key data. The system is designed based on technologies providing stability and scalability of the solution.
Test the system yourself - free.
Similar to Ace Evidence Management System Brochure (20)
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordinary And Special Businesses And Ordinary And Special Resolutions with Companies (Postal Ballot) Regulations, 2018
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
2. Don’t just track your evidence,
Manage IT
Iron Clad Chain of Custody
An indisputable record of evidence transactions that stands strong in court.
Always find what you are looking for
Locate items every time with just a fraction of information.
Free up space in the evidence room
With our active disposition feature, ACE helps to ensure evidence does not
collect dust by using advanced decision table technology to move items
from HOLD to final disposition.
Avoid letting criminals walk free
Are you using a glorified inventory system, a database app, or an enhanced
spreadsheet with time stamps? If so, you could be sitting on a time-bomb
of problems. By adhering to tried and trusted rules of evidence, ACE
ensures rules are only overwritten if allowable by law and only with an
administrator’s approval. This protects YOU by making sure you don’t release
things that are supposed to be held.
Customizable processing options
Whether you work one case at a time or one task at a time, ACE allows
you to be even more efficient by building a list with all the items you are
returning from the lab while maintaining a solid chain of custody.
Reliable support when you need it
ACE has been around for 20+ years, with long standing relationships
with agencies that have come to rely on the solid system and trusted
support staff.
“I wish to thank you and express the appreciation of our Department
for going above and beyond the contract requirements in developing a
PropertyManagementSystemfortheSuffolkCountyPoliceDepartment.
The system now in use by our Department far exceeds anything agreed
upon when the initial contract was signed. I understand countless hours
of your time were spent enhancing this system above the required
specifications, without any additional monetary compensation.
Our Department has been contacted by other law enforcement agencies
who have shown an interest in our evidence tracking system. It is nice
to know that the Suffolk County Police Department is in the forefront of
computerized evidence handling and that other agencies throughout
the Country are striving to reach our level of automated control.”
Daniel P. Guido
Commissioner
Suffolk County Police Department, NY
“ “
let ACE
3. ACE CONNECT
Our team of programmers can customize an interface with
your existing Records Management System (RMS) from any
vendor. By doing so you will be able to retrieve data from
your RMS and import the data into ACE. It will also allow you
to verify and correct all data coming in from your RMS. This will
significantly reduce redundant data entry and build a more accurate
reporting system.
Electronic Signature
Within ACE there are various points at which a signature is
required, from the withdrawal of an item to releases and
receipts. With our Electronic Signature module, and the
electronic / digital signature pad, you will be able to have
individuals sign electronically, saving all signatures within the
system. By “recording” an individual’s signature digitally it will also
significantly reduce paper receipts and filing time.
OFFICER DROP
With this module police officers and detectives can now begin
the chain of custody by entering information when depositing
evidence in their designated evidence collection locations
such as lockers. The easy-to-use interface records item type
and other pertinent information needed to begin the evidence
management process with the touch of a button. This allows the
property officer to pick up evidence and review the corresponding data,
saving the time of entering the information twice. It also provides for an
overnight drop off that works well with ACE.
MULTI MEDIA
Evidence collected from crime scenes and events are not
always tangible “bagable” items. That’s where the Multi Media
Attachment Module steps in. With this feature you can upload
video, photos, scanned documents, affidavits, court documents,
audio files, etc. and attach them to ACE as a submission to a
case. Include URL links as well and easily access web-based
systems through ACE.
mODULES
CRIME SCENE
Our Crime Scene Module helps law enforcement agencies
by facilitating the orderly collection of evidence at the
physical crime scene. The automated system creates an iron-
clad chain of custody for every item collected and entered.
ELECTRONIC DISPOSITION ORDERS
This is an optional ACE module that can be added at any time.
The report is similar to the basic Disposition Module, but further
automates the process by sending the disposition report via
email.The email connects the recipient to our secure web-based
ACE Portal allowing an officer to update the status online instantly.
In addition to the most powerful evidence management system on the
planet,therearealsomanyModulesthatareincludedorcanbepurchased
in addition to the complete system.These modules have been developed
over the years to accommodate the ever growing specialized needs of
law enforcement agencies. By selecting various modules, your agency
can buy only the components you need to fit your unique requirements.
your agency’s
requirements
Select specific Modules to address
4. Milestones
The Milestone Module allows you to track events and
tasks that go beyond the normal tracking of property and
evidence. It allows you to define your agency’s own specific
tasks and can be used in a variety of ways. For example, one
agency may add a milestone that tracks whether or not an
item has been assigned to a lab and if it has been returned. By
customizing and tracking such results the milestone module allows you
to generate valuable statistics and details based on all of the information
entered into the module.
MOBILE INVENTORY MANAGER
Employs a portable barcoding device that allows you to
easily scan items and locations while walking through your
evidence storage facility. Each scan is processed in real time
while recording all item movement and adding to the chain
of custody.
Prosecutor Access
ACE extends the property and evidence software to the
prosecutor with its optional Prosecutor Access Module.
The Prosecutor can gain view-only access to case data from
the ACE database when needed. This module works with a
secure web-based feature called ACE Portal.
QUARTER MASTER
Keep track of your equipment, gear, weapons, and supplies
issued out to officers and employees of your agency. Keep
track of all quarter master Items issued. Track the intake of
items, purchase history as well as item returns.
Fleet Manager
Keep track of your entire fleet. Fleet keeps detailed records
for each vehicle providing a complete report of issued
vehicles, to whom they were issued, and when they were
returned. Fleet provides an easy reference vehicle equipment
list. In addition, Fleet keeps track of all vehicle maintenance,
cataloging all work done from oil changes to tune ups … and yes, Fleet
provides all the reports you need.
IMPOUND
Process vehicles that your agency impounds by tracking
all towing and storage related charges for each individual
vehicle while including information such as the towing
company that was originally contacted and used. Impound
uses BARCODE technology to automatically recognize and
decode VIN information simplifying the Data Entry process.
mODULES
Fast Evidence Drop is the best thing since sliced bread!
Everyone is pleased, even the chiefs. Our officers submit
their evidence in 1/2 the time and our evidence techs
process it into the inventory in 1/2 the time.
Tom Canzoneri
Evidence Technician,
Milwaukee Police Department, WI
“
“
5. GOOGLE-LIKE QUERY
WithourProbemoduleyoucansearchforanythingandfinditwithinseconds.
Let’s say for a specific case you want to see who was the arresting officer, who
submitted that Glock last Thursday afternoon, what was the serial number,
did the latent prints go to the lab yet, who were the suspects, where is the
weapon right now, and did the defense attorney view the evidence yet?
List Processing
ACE uses a powerful concept called “List Processing”. You scan the barcode
of items you want and then tell ACE to perform one of its many transactions
such as - Move, Schedule for Disposal, Destroy, Release to Claimant, Transfer
to the Lab, etc.You can ask ACE to find the items of interest and then perform
the List Processing function. Using this powerful feature provides your
evidence people with almost unlimited flexibility.
Electronic Disposition Orders (EDO)
Replace the endless paper forms from your current disposition process
with EDO. Provides your officers with a browser and email based system
to respond to your disposition requests in an organized, timely manner.
Disposition requests are emailed directly to your officers, allowing for one
Security
ACEprovidesforacustomizableandmulti-levelsecuritysystem.Thissecurity
prevents not only intentional intrusions, but also those that are accidental
in nature. ACE is able to produce a chronological Audit Trail showing all
transactions that have ever taken place. Using our query and reporting
mechanisms, you can reconstruct item history from the day it was entered
to the day it was destroyed.
Time Delay
Items may be placed on a Time Delay Status for a number of reasons. Local
laws may require a mandatory holding period for found items, a prosecutor
may request that certain evidence be held for a particular length of time before
it is returned or destroyed, or the defense may request evidence held for an
appeal period. Whatever the reason, Time Delay allows ACE to hold property
for a specified length of time and automatically transact upon it when its date
becomes due.
ACE Transaction Rules
Your ACE Administrator can specify how ACE will react in all situations based
on your state and local Statutes.
OFFICER DISPOSITION TICKLERS
After items have been logged and a period of time has elapsed, a detailed
Tickler Report may be sent to submitting officers identifying their evidence and
requesting their disposition instructions. The officer would complete the form
by specifying each item’s disposition, whether it be HOLD, DISPOSE, RELEASE,
or TIME RELEASE. The officer returns the form to Evidence where a property
officer, using BARCODE technology sets the new status of items according to
the officer’s specifications.
click access from the email directly into the ACE Portal. Supervisor approval
is a configurable option, giving you the choice of allowing your officers to
directly affect your evidence or requiring supervisor approval before the
action takes place.
6. Don’t lose a case due to
MISHANDLED
EVIDENCE
Chain of Custody
Everyitemofevidenceisautomaticallytrackedfromcollectiontofinaldisposition.
ACE does not miss a trick; it maintains the who, what, when and why of the rules
of custody. Smile, your department is fully protected in court.
Automated Letter
Once items have achieved a“Release to Claimant Status”, letters or
mail-grams designed in Microsoft Word can be generated to the current owner.
In addition, ACE provides for a series of letters or mail-grams, based on a time
sequence set by the System Administrator, thereby giving the owner multiple
notifications and ample opportunity to reclaim the property before alternate
disposal.
ACCOUNTING AND AUDITING
The integrated Accounting system maintains all your accounting functions.
Money from controlled substance cases must be handled differently than
gambling which is different than theft, fraud, police department buy money, or
found money. Since officers often bring in money items as part of an inventory,
ACE records receipts, disbursements, checks, deposits and withdrawals. You can
set up multiple cash accounts and transfer money in or out of these accounts and
release money items to a claimant as a result of a released inventory.
People Association
If you know a person who committed a crime where evidence was involved,
you can ask ACE to provide you with a list of the Prisoner’s associates and their
associates. As a matter of fact, you ask ACE just about anything related to its data
and get a fast and reasonable answer.
REPORTING
Of course ACE has a built-in customizable reporting module. In addition, there
are over 50 standard reports that you can request instantaneously such as:
Inventory Control - includes Location, Case Number, Inventory Number,
Item Number, Quantity, Item Description and Status.
Transfer Ticklers - identifying people who have withdrawn items from
the Property Section and have not returned them within the allowable grace
period.
Transfers by Location - items transferred out to a location or another
agency.
CONTROLLED SUBSTANCE - by type, weight and location. Also by district.
People Association - prisoners, claimants and finders that may be
associated with other cases .
CHAIN OF CUSTODY - identifies every transaction in detail from collection
to final disposition.
Vault Statistics - know how much evidence is in your vault at any one
time.
Evidence Submissions by District – breakdown of evidence by district,
by date.
Active item counts – breakdown of evidence by type and count.
Audit – many reports auditing Destroys, Auctions, Releases, Officer, Evidence
Clerk and Shift Activity.
7. Powered By
ACE
540.721.1000
EvidenceControl.com
MOBILE INVENTORY MANAGER
ACE evidence system strives to provide you with the most up to date
solutions in emerging technologies and mobile platforms.
As such, we have developed the Mobile Inventory Manager, providing applications
for modern smart device computing through the Android operating system.
By having a constant link to your evidence data, Mobile Inventory Manager puts
everyday tasks like taking inventory or moving items into the hands of your property
technicians.
The application is always connected to your data. Problems such as invalid item
location or attempting an invalid move are noticed immediately and generally
before the technician leaves the property room. Mobile Inventory Manager also
implements the ACE List Feature, allowing you to create and save item lists from
the warehouse and open immediately for action in the ACE desktop application. A
constant data connection also enables the Mobile Inventory Manager to know the
exact status of any open inventories that were started but not completed. When the
next technician scans the location, they will be able to pick up the inventory exactly
where the last technician left off. Easy to follow screen prompts in the application
show you all the items that should exist in your location, with indicators for those
items you have already scanned, allowing you to know at a glance how much of the
inventory you have accomplished.
Missing items will be immediately apparent without waiting to synchronize with a
desktop computer. And since it is designed for the Android operating system, Mobile
Inventory Manager can accommodate a large number of devices, reducing hardware
costs for those clients that already provide smart devices to their technicians.