From investigation of Poice, Accusation decision of Prosecutor, Trial of court, Prison of Minister of Justice (Public)...integrated and one stop management
Breve sintesi della "Personal Information Protection Law" cineseEdoardo Ferraro
Breve sintesi sui punti essenziali della legge cinese in tema di protezione dei dati personali. Con una veloce bibliografia sugli articoli più interessanti sul punto e la traduzione inglese della legge.
The Central and Eastern Europe countries are undergoing significant change as they accelerate to becoming digital economies. A key cornerstone for the region’s future economic success is the quality of its justice system. Investors will steer clear of societies who have anything less than a robust justice system. With increased mobility citizens will similarly vote with their feet.
Breve sintesi della "Personal Information Protection Law" cineseEdoardo Ferraro
Breve sintesi sui punti essenziali della legge cinese in tema di protezione dei dati personali. Con una veloce bibliografia sugli articoli più interessanti sul punto e la traduzione inglese della legge.
The Central and Eastern Europe countries are undergoing significant change as they accelerate to becoming digital economies. A key cornerstone for the region’s future economic success is the quality of its justice system. Investors will steer clear of societies who have anything less than a robust justice system. With increased mobility citizens will similarly vote with their feet.
Amid mounting criticism of Ireland’s privacy watchdog, top European Commission official Didier Reynders has come to Dublin’s defense, brushing off calls to penalize the country over claims it has failed to uphold Europeans’ privacy rights.
The defense, in a letter to MEPs, comes after lawmakers including Sophie in ‘t Veld and Tineke Strik from the Netherlands and Cornelia Ernst and Birgit Sippel from Germany urged the EU executive to open a disciplinary procedure against Dublin.
Data protection for Lend.io - legal analysis by Bird and BirdCoadec
New EU data protection rules are coming, with the General Data Protection Regulation likely to be agreed in the next few months. It will have a massive impact on digital businesses
To bring this rather dry subject to life, Coadec working together with techUK has commissioned a leading data protection law firm to look at what current drafts of the new law would mean for a fintech startup we invented, Lend.io.
Current State of Personal Data Protection in Electronic Voting: Criteria and ...TELKOMNIKA JOURNAL
The adoption of electronic voting has been done in various countries related to cost and time reduction operationally. On the other hand, recent publication has been informed several issues occurred such as technicality, reliability, security and privacy due to the compromised system were used. In small scale, there are certain group of people who want to exploit the vulnerabilities for their own benefit in the election, while in the greater scale, it can reduce public confidence to entrust the adoption of e-voting system to augment participation rate, to improve the quality of voting and to aid the political right effectively. This paper aims to investigate the characteristic of people demanding the legislative to address the criteria and indicator for effective implementation in electronic voting. By understanding the perception of voters in viewing current electoral regulation are essential to provide some ideas and opinions for better enhancement, either through recommendation and drafting related legislation to cater the needs.
Republic Act 10173 Data Privacy Act of 2012 (DPA)
“An act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a National Privacy Commission, and for other purposes”
“Data localisation or data residency laws require data about a nations' citizens or residents be collected, processed, and/or stored inside the country, often before being transferred internationally, and usually transferred only after meeting local privacy or data protection laws, such as giving the user notice of how the information will be used and obtaining their consent.” - Wikipedia
Data theft rules and regulations things you should know (pt.1)Faidepro
The IT Act appears to be adequate in regards to data theft, it is insufficient in addressing the minute technical intricacies involved in such a crime, leaving gaps in the law and allowing the perpetrators to get away with it. Since this problem affects more than one country and has international implications, we have briefed the countries that have such law and how it works; Which will be covered in two parts.
Providing legal advisory services within the scope of the General Data Protection Regulation (GDPR) in areas where the company's situation is required.
Providing consultancy services for the establishment of the company's personal data processing inventory. In this context;
Determination of personal data processing purposes,
Determining the categories of personal data which is processed in your company,
Establishing the transfer of personal data to third parties both domestically and the measures to be taken for their safety,
Determination of the maximum periods for the personal data protection purposes,
Deletion, destruction and anonymization of personal data if the storage period foreseen in the legislation is over.
Providing consultancy services for setting up mechanisms to ensure data security.
Revising of company’s contracts and if necessary, conducting the negotiation processes accordingly and drawing up the additional protocols.
Providing consultancy services for ensuring that the electronical surveillance systems in work places such as camera surveillance, electronic or biometric entry and time detection, global positioning system, electronic transmission surveillance are coherent with the regulations.
Drawing up personal data retention and destruction policy and data security policy based on personal data processing inventory. In this context;
Determination of technical and administrative measures to ensure the safety of personal data,
Determination of technical and administrative measures and methods for the destruction of personal data in accordance with the law,
Determination of periodic destruction periods and preparing a document that shows storage and destruction periods.
Providing legal services with regard to drawing up and/or revising the “Privacy Policy” / “Cyber Security Policy” / “Cookies Policy” .
Evaluating the compliance with law in transferring of personal data both in domestic and to foreign territories and preparing the the contracts accordingly.
Providing legal services with regard to setting up mechanisms as to division of responsibilities stipulated for companies as “data controller/data processor” .
Informing the employees about current regulations with regard to security and protection of personal data.
Executing transactions before the Turkish Data Protection Board and providing consultancy services in the scope of administrative procedures.
Key Issues on the new General Data Protection RegulationOlivier Vandeputte
The General Data Protection Regulation is one of the most wide ranging pieces of legislation passed by the EU in recent years. The GDPR comes into effect on 25 May 2018. The new framework is ambitious, complex and strict. It presents any organization that has so far failed to begin preparations with a steep challenge to become GDPR compliant in time.
We have summarized the key issues in our GDPR brochure.
Clyrofor webinar series consists of several webinar sessions, brought together by highlighting various Cyber Security topics and hosting sessions through out the year on a quarterly basis. the POPIA Readiness Webinar session was our very first kick off session, where we had our guest Speaker Mr Nemasisi (Executive: PAIA) give us a brief break down of the POPI act and it's requirements. This slide gives clear details on what was discussed during our webinar session.
Authors R. Michael Alvarez (California Institute of Technology) and Jonathan Nagler (New York University) have analyzed the likely impact on voter turnout should Maryland adopt Same Day Registration (SDR). Under the system proposed in Maryland, eligible voters who miss the current 21-day deadline for registering may be able to register to vote during the state's 7-day early voting period, or on Election Day. Consistent with existing research on the impact of SDR in the other states that use this process, the authors find that SDR would likely lead to substantial increases in voter turnout.
Software Development life cycle:
SDLC is a process followed for a software project, within a software organization. It consists of a detailed plan describing how to develop, maintain, replace and alter or enhance specific software. The life cycle defines a methodology for improving the quality of software and the overall development process.
Phases:
Planning
Analysis
Design
Implementation
Testing
Amid mounting criticism of Ireland’s privacy watchdog, top European Commission official Didier Reynders has come to Dublin’s defense, brushing off calls to penalize the country over claims it has failed to uphold Europeans’ privacy rights.
The defense, in a letter to MEPs, comes after lawmakers including Sophie in ‘t Veld and Tineke Strik from the Netherlands and Cornelia Ernst and Birgit Sippel from Germany urged the EU executive to open a disciplinary procedure against Dublin.
Data protection for Lend.io - legal analysis by Bird and BirdCoadec
New EU data protection rules are coming, with the General Data Protection Regulation likely to be agreed in the next few months. It will have a massive impact on digital businesses
To bring this rather dry subject to life, Coadec working together with techUK has commissioned a leading data protection law firm to look at what current drafts of the new law would mean for a fintech startup we invented, Lend.io.
Current State of Personal Data Protection in Electronic Voting: Criteria and ...TELKOMNIKA JOURNAL
The adoption of electronic voting has been done in various countries related to cost and time reduction operationally. On the other hand, recent publication has been informed several issues occurred such as technicality, reliability, security and privacy due to the compromised system were used. In small scale, there are certain group of people who want to exploit the vulnerabilities for their own benefit in the election, while in the greater scale, it can reduce public confidence to entrust the adoption of e-voting system to augment participation rate, to improve the quality of voting and to aid the political right effectively. This paper aims to investigate the characteristic of people demanding the legislative to address the criteria and indicator for effective implementation in electronic voting. By understanding the perception of voters in viewing current electoral regulation are essential to provide some ideas and opinions for better enhancement, either through recommendation and drafting related legislation to cater the needs.
Republic Act 10173 Data Privacy Act of 2012 (DPA)
“An act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a National Privacy Commission, and for other purposes”
“Data localisation or data residency laws require data about a nations' citizens or residents be collected, processed, and/or stored inside the country, often before being transferred internationally, and usually transferred only after meeting local privacy or data protection laws, such as giving the user notice of how the information will be used and obtaining their consent.” - Wikipedia
Data theft rules and regulations things you should know (pt.1)Faidepro
The IT Act appears to be adequate in regards to data theft, it is insufficient in addressing the minute technical intricacies involved in such a crime, leaving gaps in the law and allowing the perpetrators to get away with it. Since this problem affects more than one country and has international implications, we have briefed the countries that have such law and how it works; Which will be covered in two parts.
Providing legal advisory services within the scope of the General Data Protection Regulation (GDPR) in areas where the company's situation is required.
Providing consultancy services for the establishment of the company's personal data processing inventory. In this context;
Determination of personal data processing purposes,
Determining the categories of personal data which is processed in your company,
Establishing the transfer of personal data to third parties both domestically and the measures to be taken for their safety,
Determination of the maximum periods for the personal data protection purposes,
Deletion, destruction and anonymization of personal data if the storage period foreseen in the legislation is over.
Providing consultancy services for setting up mechanisms to ensure data security.
Revising of company’s contracts and if necessary, conducting the negotiation processes accordingly and drawing up the additional protocols.
Providing consultancy services for ensuring that the electronical surveillance systems in work places such as camera surveillance, electronic or biometric entry and time detection, global positioning system, electronic transmission surveillance are coherent with the regulations.
Drawing up personal data retention and destruction policy and data security policy based on personal data processing inventory. In this context;
Determination of technical and administrative measures to ensure the safety of personal data,
Determination of technical and administrative measures and methods for the destruction of personal data in accordance with the law,
Determination of periodic destruction periods and preparing a document that shows storage and destruction periods.
Providing legal services with regard to drawing up and/or revising the “Privacy Policy” / “Cyber Security Policy” / “Cookies Policy” .
Evaluating the compliance with law in transferring of personal data both in domestic and to foreign territories and preparing the the contracts accordingly.
Providing legal services with regard to setting up mechanisms as to division of responsibilities stipulated for companies as “data controller/data processor” .
Informing the employees about current regulations with regard to security and protection of personal data.
Executing transactions before the Turkish Data Protection Board and providing consultancy services in the scope of administrative procedures.
Key Issues on the new General Data Protection RegulationOlivier Vandeputte
The General Data Protection Regulation is one of the most wide ranging pieces of legislation passed by the EU in recent years. The GDPR comes into effect on 25 May 2018. The new framework is ambitious, complex and strict. It presents any organization that has so far failed to begin preparations with a steep challenge to become GDPR compliant in time.
We have summarized the key issues in our GDPR brochure.
Clyrofor webinar series consists of several webinar sessions, brought together by highlighting various Cyber Security topics and hosting sessions through out the year on a quarterly basis. the POPIA Readiness Webinar session was our very first kick off session, where we had our guest Speaker Mr Nemasisi (Executive: PAIA) give us a brief break down of the POPI act and it's requirements. This slide gives clear details on what was discussed during our webinar session.
Authors R. Michael Alvarez (California Institute of Technology) and Jonathan Nagler (New York University) have analyzed the likely impact on voter turnout should Maryland adopt Same Day Registration (SDR). Under the system proposed in Maryland, eligible voters who miss the current 21-day deadline for registering may be able to register to vote during the state's 7-day early voting period, or on Election Day. Consistent with existing research on the impact of SDR in the other states that use this process, the authors find that SDR would likely lead to substantial increases in voter turnout.
Software Development life cycle:
SDLC is a process followed for a software project, within a software organization. It consists of a detailed plan describing how to develop, maintain, replace and alter or enhance specific software. The life cycle defines a methodology for improving the quality of software and the overall development process.
Phases:
Planning
Analysis
Design
Implementation
Testing
This documentation have all the details about school management system, even in this document have DFD,ERD,FDD digram that are useful to create database. to get more details about this product plz mail me on (aki_string@yahoo.co.in) thanks.....
New criminal laws— Future of criminal justice system in Indiaaakash malhotra
The three new criminal laws, the Bharatiya Nyaya Sanhita, the Bharatiya Nagarik Suraksha Sanhita, and the Bharatiya Sakshya Adhiniyam, which replace the Indian Penal Code (IPC), the Code of Criminal Procedure (CrPC), and the Indian Evidence Act respectively, will come into force from 1 July this year
The techo revolution is finally here. We need to intergrate technology and litigation proces. Its a high time litigants used smartphones for submitting their cases, highlighting their submissions and case management.
Paul Whittaker CBE, Common Platform Transformation Director, Crown Prosecutio...CSSaunders
A presentation by Paul Whittaker CBE, Common Platform Transformation Director, CPS, on how digital technology will transform the interface between policing and the criminal justice system - delivered at the Police Foundation's annual conference 'Policing and justice for a digital age' December 2016.
E-Police: solution for the state and municipal law enforcement institutions responsible for data recording, investigation and legal decision making regarding criminal and administrative offences.
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docxtodd271
Running Head: CRIMINOLOGY USE OF COMPUTER APPLICATIONS 2
CRIMINOLOGY USE OF COMPUTER APPLICATIONS 2
In the wake of technological advances, the use of computers has played a major role especially in criminal justice (Moriarty, (2017). This paper has focused on the use of computer application technologies in criminology and the potential it has in legal systems. From enabling easy access for witnesses to search for accused peoples’ photographs on the screen and go through the whole court procedural activities. Moreover, criminals’ records can be monitored using databases and it is easy to make a follow-up on crimes they have committed in the past and the charges against them. Forensics can also be conducted and investigations can now be carried out easily and very fast. Also, when one is linked to cases, they can be easily identified using forensics and fingerprints. Portable laptops have also helped police officers in getting information and any important details related to a crime at any place without having to go back to their working stations. James (2017), argues that unlike in the past, investigations are done faster due to internet connections and ease of communication between community members and investigative officers through the use of phone gadgets.
Computers have broad variance in usage which has been enhanced by computer applications. For instance, massive record keeping systems have relied for reference on criminal accounts, case records and unresolved warranties. Incorporation of technology in criminology has just made the career easy and also improved livelihoods. Many police units now use computerized applications to keep up with the ever-rising crimes. There are different applications being used nowadays, from mobile technology, to use in-car computers, CCTV camera installations and also software such as the Computer Aided Dispatch. Investigators often use programmed record management systems to monitor information they obtain and guard it properly. With the current technology, it is possible to detect impending crimes, track stolen goods and the culprits, tell which time a crime occurred and also who committed it and where.
Computer applications:
1. In-Car Computer installations in police cars.
Blumstein (2018), contends that this application that allows traffic patrol police to effectively carry out their activities especially when vehicles violate traffic rules. In the current world, things are drifting toward being more computerized than handwritten (Maxfield & Babbie, 2014). Thus event arrest reports are being typed. It also means that after traffic references are written down, they are generated by the computers installed duplicating a copy to the person who breaks the rules. This is seen to reduce paperwork and improve the efficiency of police officers' work.
2. Computer Aided Dispatch
In the past, correspondents would use hand.
Compliance and software transparency for legal machinesVytautas Čyras
Slides presented at the 11th International Baltic Conference on DB and IS, Baltic DB&IS 2014, Tallinn, Estonia, 8-11 June 2014, http://ati.ttu.ee/dbis2014/.
Abstract: This paper attempts to define the software compliance and transparency problem. This constitutes a high level holistic view. The context is the changeover from a text culture to a machine culture. Note that equal access to e-procedures does not guarantee justice. The transparency of the law leads to the transparency of software and hence challenges legal informatics. We formulate two requirements for legal machines: 1) software architecture must be made accessible; and 2) software must provide legal protection. A need therefore arises for the legal requirements to flow down to lower level specifications. We explain the notion of subsumption – a legal qualification of facts according to a norm’s circumstance. In the end we discuss the definition of the compliance problem.
Introduction
We address regulatory compliance as an ideal and attempt providing holistic abstract formulations of the problem. A layperson in law (e.g., a software engineer) and a jurist may view legal rule violations differently. The reason is that a layperson can barely understand the whole interconnectedness of legal norms. Therefore, determining software compliance with the law is a complex problem. Note that an information system can cause harm as any misused artifact can. For example, a computer generated message can cause a heart attack analogously as a pencil can serve as a murder tool.
Consider the question “Is software compliant with the law?” The answer need not be “yes” or “no” but can extend to an evaluation spectrum from optimistic to pessimistic. We find this question similar to the question, “Can machines think?” by Alan Turing [13]. Turing begins with the definitions and the meaning of the terms “machine” and “think”. Analogously, we regard the terms “compliant” and “the law”.
This paper extends our earlier studies on legal machines [2], transparency [3], and compliance [4]. A legal machine can be defined as a machine in a system whose actions have legal importance and legal consequences [2].
There are simple legal machines, such as traffic lights, barriers and vending machines, and complex ones, such as the electronic forms that are used for taxes and finance. An example of the latter is FinanzOnline that provides a one-click link to the Austrian tax administration; see https://finanzonline.bmf.gv.at/. Legal machines shift raw facts into institutional facts, i.e., facts that have legal importance. The raw facts come from the Is world, whereas the institutional facts come from the Ought. For example, a fraud is committed when dropping fake coins in a vending machine whereas a child may put outdated coins in her piggybank. Is and Ought are distinguished in the theory of law; see Hans Kelsen [6]. Legal machines contribute to law enforcement, and their software implement legal norms.
A Proposed Transformation Model for Integration Between E-justice Application...Eswar Publications
The electronic services become an important integral part of the Information Systems which supported by the term e-government. Many traditional business systems are now shifting to electronic systems and that in the midst of tremendous information, which is stored inside these systems. There are many researches in business information systems and their importance and advantages. Transforming business information systems to gain profit especially in government services is more difficult. This paper discusses the factors effects on the transformation of business information system represented in the State Council of Egypt information systems as a case study to an electronic inquiries system.
Abstract—In developing countries there is a number of commodities and services which are financially supported by the
government as financial aid to their citizens. Such commodities
as bread, cooking gas and car fuel, all that commodities and
services follow a same systematic manual distribution process.
This typical and manual process is time and effort consumed for
the government, it also weak in term of control and monitoring,
so that the middle non-governmental entities can smuggle these
commodities outside the legal channels for double profit seeking
or intentional political reasons. In all cases, this will lead
to unsatisfactory situation within citizens and open doors for
corruption and chaos. This paper introduces model for solving
this problem by increasing the control for whole process and
thus decreasing the smuggling and wasting rates. The proposed
model is based on Identity-based Cryptography, so it provides the same security features and services as traditional PKI without the overhead of key management when the number of users in the system gets large.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
A new approach to International Judicial Cooperation through secure ICT platf...ePractice.eu
Authors: Mauro Cislaghi | Domenico Pellegrini | Elisa Negroni.
Cooperation between judicial systems is a key factor for sustainable development, one of the EU’s major priorities. eGovernment plans and e-Justice initiatives supported by the European Commission and national governments create a very favourable background for the adoption of ICT standards in the area of cross-border judicial cooperation, both in Member States and in pre-Accession countries.
Similar to Integrated criminal and justice information system of Korea (20)
Real time statistics of daily/weekly/monthly/yearly incidents, Real time statistics of dispatched resources, real time display of incidents lists, on-going incidents, extra
All in one of CCTV monitoring, Patrol car tracking, Emergency call taker and dispatcher, data analysis for disaster, emergency response, crime response or etc on digital map
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordinary And Special Businesses And Ordinary And Special Resolutions with Companies (Postal Ballot) Regulations, 2018
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
5. - 5 -
KOICA
- Joint utilization of information between agencies
The police, prosecution service, courts, and Ministry of Justice independently operate their respective systems,
but these systems are linked to the common system and are closely operated. Information entered earlier by
each agency does not need to be entered again by other agencies, boosting work efficiency and ensuring
information accuracy as well as speedy handling of work.
- A total of 394 types of information are jointly being utilized.
The police provides 74 types of information, such as opinion reports, transfer reports, and crime history data.
The prosecution service provides 160 types of information, such as written arraignments, non-indictment
decisions, various warrant claims, and command over punishment execution.
The courts provide 95 types of information, such as warrant issuance/dismissal information, trial date information,
and written judgments.
Finally, the Ministry of Justice provides 65 types of information, such as imprisonment information and
information on the targets of probation.
Que es KICS?
6. - 6 -
KOICA
- Complete electronic handling of drunken- and unlicensed-driving cases
The criminal justice work by criminal justice agencies is electronically handled, shortening the handling period
from four months to 28 days with regard to summary procedures such as the drawing up of documents, the
transferring of cases, indictment, summary order, and the forwarding of documents in summary indictment
cases. This system is called electronic-summary procedure.
With the adoption of the electronic-summary procedure system, in the current year (2011), about 30% of the
total criminal cases are handled electronically, without paper documents, drastically reducing the workload of
criminal justice agencies.
The persons concerned are electronically notified of the confirmation of penalty cases via e-mail or SMS,
increasing the general public’s convenience.
Que es KICS?
7. - 7 -
KOICA
- Real-time provision of criminal-case progress information
At South Korea’s criminal justice portal (www.kics.go.kr), case progress can be accessed anywhere,
anytime.
Also, information on various notices and court records, and on penalty imposition, is provided real-
time.
Que es KICS?
8. - 8 -
KOICA
Applications for the issuance of various certificates, filing of petitions and pleas, and submission of
other case documents can be made online.
- The portal provides a total of 71 online civil services. Various notices, court records, and non-
indictment decisions can be accessed online. Also, inquiries about unpaid penalties, real-time online
payment thereof, and application for deposit return can be made online.
The portal provides comprehensive information on criminal justice, such as various related document
forms, judicial precedents, and laws, to boost the convenience of criminal justice services.
Que es KICS?-Online civil services
9. - 9 -
KOICA
- Bolstering the general public’s convenience
Through the portal (www.kics.go.kr), the whole criminal-case progress, from the investigation to the trial
results, can be inquired about in real time.
Access to court records and criminal-justice-related civil-service documents can be applied for online, or
such documents can be issued immediately.
Unlicensed- and drunken-driving cases can be completely electronically handled, drastically shortening
their handling period, and the handling results can be received via e-mail or SMS.
Enhancing the transparency of criminal proceedings
The transparency of and responsibility for handling work related to criminal proceedings can be
strengthened by strictly managing the authority by agency and employee, and by keeping ground
documents for handling such work as records of logs.
Information on criminal-case progress at the police stations, prosecution service offices, and courts is
provided via mobile-phone messaging, enhancing the transparency of criminal proceedings.
Enhancing work efficiency and accuracy, and cutting the budget
Reduces the time required for (e.g., delayed forwarding of paper documents) and the errors that may be
committed (e.g., making double entries of the same information) when handling work offline, thus
eliminating work inefficiency
With the introduction of electronic systems, paper books are transformed into electronic books, and the
work time is cut, thus saving money.
Que es KICS?-Online civil services
10. - 10 -
KOICA References in Korea - Organization
The project of Korea integrated Criminal Justice Information System(KICS), launched
in 2004, is the core part of a strategy to implement an justice system based on the
concept of electronic files, using open source standards.
In Organization and Function characterized by integrated model between integrated
model and segregated model, professionally-trained staff are making Management
System by applying their knowledge and expertise to the specific circumstances of
the criminal case.
Accordingly, users may be able to play a more interactive role in their dealings with
the organization and the function, although they are still subordinate to the
professional experts. By the integrated model of the Organization and the function,
users can take a more active role in asserting their rights and arguing the their case.
So, the Operation and the Organization of the Korea integrated Criminal Justice
Information System should be made by independent decision-makers who are able
to weigh up the arguments of the parties.
The legitimating goal of this integrated model is efficiency and is premised on
managerial autonomy. Anyway, it is expected that the project will create not only
internal efficiencies, but more importantly even benefits to citizens in terms of lower
cost and simper, faster procedures.
the Organization and the Function of the Korea integrated Criminal Justice
Information System
11.
12. - 12 -
KOICA
Policia -
Borracho
Registro PDA
sobre caso o
incidente
Investigacion
en la policia
estacion
PAD o
Computadora
E-resumen
caso
Memoria
/Documento
Procuradoria
acusacion
Investigacion
del refuerzo
E-procesamieto
Orden
judicial
E-Orden
Acusado
E-acuerdo
MP
coercion/ejer
cion
Pago del
penal
Pago
internet
banking
Ejercion
Mando
documento
Ejercion
E-Resumen
24. - 24 -
KOICA
Caso ; tiempo, fecha,
ubicado, perfil, Tipo
de Aresto, Agresor;
ubicado del perfil,
Documento de crimen
estado de
crimen
Policia-Caso Nuevo
32. - 32 -
KOICA Reference – Todo sistemas en la procuradoria
판결문
(영상)
판결문
(영상)
주전산기주전산기
eProsePros
압수물관리압수물관리
통계서버통계서버자유형집행자유형집행
이동통신이동통신
출입통제출입통제
기록보존기록보존
형사사법망
대법원
교정국
경찰청
수사정보시스템
표준문서
검찰내부시스템 형사사법기관Inter Procuradoria Extra Agencias
Sistema de
investigacion
Caso
Consficaci
on
Estandar
documento
Decumento
gestion
EstastistaEjecucion
Movil
Video
media
Controlar de
Entrada y
Salida
33. - 33 -
KOICA Reference – Sistemas del procuradoria
Sistema Funciones descrpcion
Integrrado administraciontrabajador
○ Gestiondel procuradoria administracion; Caso,ejecucion, mandamiento judicial, Cartedeaprobacion
○ Intercambiar de documento entre otra sistemas (Estatista, investigation, Video y multi-
medica delito)
Gestiondel caso decriminal
Investigacion
○ iinformaciondel estadodelcaso, horario de tribunal,
○ Gestiondelestandar documento formato
○ Gestiondel juicio ytribunaldocumento
Estastista
○ Crear de estatista del caso o otra dato (2,120 tipos del uniform, )
○ Intelligent del negocio (Business intelligence, 480 tipes)
Videoymulti-media del delito
Resumen sentencia,
Video y multi-media datos del delito , druga, Mafia, Pandilla violencia, immigracion
Consficacion ○ Consficacion articulos , registrodel consficacion
Documentoy biblica
○ Documento del criminal caso
○ Aquiler del documentos
Ejercusiondelencarcermiento
○ Gestion del ejecucion encarcermiento
○ Gestion del liberacion
Gestiondecrimen mayor
○ Informacion del delito mayor y criminal
○ Informe ( Ocurrir, detener, habeas corpus, liberdad bajo fianza, apelacion(recurso),
condenacion(sentencia) ejecucion, , pedido de tribunal de procesamiento)
34. - 34 -
KOICA Reference – Prosecutor –documento y biblica gestion del
bar-code