Top Banner
26

Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Jan 03, 2016

Download

Documents

Bethany Harvey
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.
Page 2: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Each user has a unique name and password

Permission settings for each user determines what functions the user can perform

Click Here

Page 3: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

This is the Main Console that supervisory personnel see when they log in

Click this button to enter a new case

Begin by entering a new case

Page 4: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

This is the case file screen where case information is entered and viewed

Click here to simulate entry of case information

Page 5: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Click here to enter case assessment information

Page 6: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Click here to enter assessment data

Page 7: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Checkboxes allow the user to indicate the criteria present on this case

Click here to simulate entry

Page 8: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Based on the criteria entered, the solvability and total closure value are enteredand a recommended review date is set. The higher the solvability and closurevalue, the easier the case should be to solve

Click here to assign the case to a detective

Page 9: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Click here to enter assignment information

Page 10: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Click here to view case load

In order to know to whom the case should be assigned,current case load should be taken into consideration

Page 11: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Total active cases are shown by officer

Total number of cases per officer

Pie chart provides graphic depiction of case assignment

Click here to view average solvability factor of active casesPer officer

Page 12: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Bar graph shows graphic depiction of average solvability factorof active cases per officer. The higher the value, the easier the casesare that are assigned to that officer

Click here to view averageclosure values

Page 13: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Bar graph shows graphic depiction of average closure valueof active cases per officer. The higher the value, the easier the casesare that are assigned to that officer

Click here to returnto case assignment

Using the information on the last three screens, case load can be more evenlybalanced than just by using the total number of cases assigned

Page 14: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Officer is selected here

Click here to simulate assigning case

Page 15: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Enter the Case Particulars. The particulars of the case will help toestablish an “method of operation” for the crime.

Click here to enter the particulars

Page 16: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

The particular categories, labels and dropdown choicesare completely configurable. There are 36 particulars that can be entered for each case.

Click here to simulate entry

Page 17: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.
Page 18: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Once the particulars are entered, they can be compared to othercases in the system to check for similar crimes.

Click here

Page 19: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Cases are analyzed and similar cases are ranked according to similarity

Click here to return to case file

Page 20: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Other features of the case file include:

Enter additional offenses

Enter/track judicial action(hearings, trials, etc.)

Assign/track assignment history

Enter/track supervisory case review

Enter/update/track case disposition

Enter/track related evidence

Enter/track tasks to be completed

Enter/view case logs (notes, supplements, phone calls, etc.)

Enter/track time and expenses on case

Enter/track property involved and values

Password protect case file if necessary

Print entire case file or select part to print

Enter suspect, witness, victim and others

Attach related reports, documents and images

Track the number of days required to complete the investigation

Page 21: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

There are many ways to search for data

Page 22: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.
Page 23: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.
Page 24: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

This is the Case File Management Console that is seen by investigators when they log in

The information shown here only applies to the user that is logged in

This is a list of this user’s cases

Page 25: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

These are only a few of the features and functionalities of this powerful application

Please contact us for more information

Page 26: Each user has a unique name and password Permission settings for each user determines what functions the user can perform Click Here.

Thank you for viewing this presentation onCenturion Case Management Software

For more information please contact us501-315-2625

Or submit a request for more information athttp://http://www.executivetechnology.net/pages/27/index.htm