Establishing secure connection… Loading editor… Preparing document…
Navigation

Fill and Sign the Realtor Association of the Fox Valley Residential Lease Form

Fill and Sign the Realtor Association of the Fox Valley Residential Lease Form

How it works

Open the document and fill out all its fields.
Apply your legally-binding eSignature.
Save and invite other recipients to sign it.

Rate template

4.7
57 votes
NORTH CAROLINA DEPARTMENT OF JUSTICE Agency IT Plan 2009 – 2011 Biennium Submitted by CIO Nancy C. Lowe, September, 2008 Special thanks to all DOJ staff who contributed to the content of this plan. N. C. Department of Justice Information Technology plan for 2009-2011 Biennium Table of Contents I. EXECUTIVE SUMMARY (pages 3-6) II. FACTORS INFLUENCING DOJ’S IT PLAN (pages 7-13) III. CURRENT SITUATION/ DESIRED STATE (pages 14-15) IV. MAJOR INITIATIVES AND INVESTMENTS (pages 16-31) 2 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium I. EXECUTIVE SUMMARY The North Carolina Department of Justice (NCDOJ) is composed of the State Bureau of Investigation (SBI), Legal Services, Training and Standards, and other support functions associated with the Attorney General’s office including Human Resources (HR), Financial Services, the Public Information Office and Victim’s and Citizen’s Services. The mission for the DOJ is to fight crime and protect the people of North Carolina. Issues that are vitally important to the Attorney General (AG) include support of NC law enforcement by providing information that keeps officers safe in the performance of their duties and allows them to protect the public from predatory and criminal activity, provision of legal services to state agencies and the state of NC, services for victims, internet safety, the protection of citizens as consumers, and the offering of training for law enforcement and maintenance of associated standards. The DOJ is a citizen-centric agency, focusing on the needs of citizens as one of our primary consumers of our services. In support of the Attorney General’s goals for the DOJ, the IT Division successfully implemented a new fingerprint system for law enforcement this year, submitted an RFP for a case management system for legal services, and began consolidating approximately 10 legacy applications into one Training and Standards application which will roll out in FY 08/09, thus enabling standardized methods of tracking and collecting training activity for criminal justice entities across the state. Phase I of a Tracking and Billing application was completed for the SBI to track billing of the fee-for-service and civil applicant criminal background checks. Phase I of a new laboratory information system was completed for the crime lab enabling them to process crime evidence faster, a new asset tracking system was developed, and ITD also renovated two buildings on the SBI campus, equipped a data center in one of the buildings, and moved from Raleigh to the SBI campus in early 2007. Looking forward into the new biennium (09-11), there are many IT projects that will be tackled to meet the goals of the DOJ. Projects below are not in a particular priority order. Legal Services projects: The legal services division (comprised of Administrative, Civil, Criminal, Environmental, Special Litigation, Consumer Protection, and Law Enforcement Prosecutions) provides legal representation and advice to all state government departments, agencies and commissions. The Attorney General provides legal opinions at the request of other public officials and handles all criminal appeals from state trial courts. When public interests are at stake, the Attorney General can take legal action on behalf of the State and its citizens. Projects on the horizon for the 09-11 biennium include the following:  Legal Services Scanning Project- The DOJ annex, located in the Old Education building in downtown Raleigh is being demolished as a part of the new Green Square project. There are over 26 million Legal Division and related documents in the annex including criminal appeal files, capital murder appeal files, civil tort 3 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium claim files and related legal and administrative documents. Over the next three years, a project must be initiated to automate these records.  Legal Services Case Management- Legal Services desires to implement a centralized case management system for the legal services staff in DOJ which will allow for the provision of legal services to clients (state agencies and the public) more efficiently, and allow for statistics and reports regarding those services. The legal community has been mandated to file electronically in all federal courts, some state courts, and several administrative agencies. An RFP has been issued and the roll out of a new automated COTS product is planned to begin in early 2009 and continue through the 09-11 biennium.  Collections Debt Management Project- The Collection Section of the Attorney General’s office is a small section that collects account receivables for all state agencies, community colleges and universities and student loans for community colleges and universities. This application will allow data to be captured from agency/university/community college and debtor information, automate the production of demand letters to debtors and capture information regarding monies sent and how payments are made. SBI and Law Enforcement (LE) projects: The SBI is a division of the Attorney General’s office and provides support to local law enforcement with criminal investigations across NC. At the request of local law enforcement, the SBI assists with investigations such as homicides, missing person’s cases, robberies, and property crimes. The SBI has original jurisdiction in investigations involving drugs, arson, election laws, child abuse in day care centers, theft and misuse of state property, and computer crime investigations involving crimes against children. The SBI has statewide jurisdiction and assists other state agencies in the apprehension of criminals and also has a laboratory where all crime scene evidence is analyzed. Projects for the new biennium include the following:  Sex Offender Registration and Notification Act (SORNA) - New federal legislation requires that NC change the Sex Offender Registry (SOR) application and web site to be compliant with federal SORNA requirements for managing information on registered sex offenders and providing information to the public. This will facilitate investigation of sex crimes, better protect the public from sex offenders, and prevent NC from being subject to a 10% reduction in federal grant funding for failure to comply with SORNA.  UCR (Uniform Crime Reporting) - To meet the growing demand for crime reporting in NC, the SBI desires to re-architect its UCR platform. This involves developing a strategic plan that exposes data deficiencies and provides connections through data integration and improved reporting capabilities. The goal is to ensure that NC speaks with one voice regarding criminal data and provides law enforcement with current data to assist with criminal investigations. 4 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium  Criminal Justice Data Integration- The updated Appropriations Act from the NC legislature’s short session funded a “Criminal Justice Data Integration Pilot Program.” DOJ will likely participate in this project or complete related projects in support of this project. The Data Integration oversight body recently met for the first time but the exact involvement of DOJ is uncertain at this time.  NCATS/LEMS Integration- The SBI desires to create an interface between North Carolina Applicant Tracking System (NCATS) and Law Enforcement Message Switch (LEMS) for automating exchange of information necessary for completion of fee-for-service and civil applicant criminal background checks performed by SBI Criminal Information and Identification Section (CIIS).  NCATS Portal- This project will provide a secure web portal for agencies to request fee-for-service and civil applicant background checks performed by SBI Criminal Information and Identification Section (CIIS), monitor the status of requests, and retrieve the results.  SBI Information Flow Study- This study will assess the flow of information between organizational units and systems within SBI and make recommendations for improvements in processes and information systems.  Mobile Automated Fingerprint Identification System (M-AFIS)- This project is to procure and distribute mobile devices for LE agencies to capture fingerprints and create new workflows in existing Statewide Automated Fingerprint Identification System (SAFIS) to process these fingerprints, interface with other systems (FBI IAFIS, CCH, etc.), and provide results back to LE agencies.  Cybercrime Computer Evidence Analysis and Storage Environment (CEASE) for Western and Triad Crime Labs- Procure and implement Cybercrime Computer Evidence Analysis and Storage Environment (CEASE) for Western and Triad Labs. Cybercrime CEASE is already being implemented in the Raleigh Lab using federal grant funding. This project will support establishment of digital evidence sections at the Western and Triad labs and allow SBI to expand the number and types of digital evidence cases it accepts beyond the murder and sex crime cases to include other felonious crimes for which digital evidence may support investigation and prosecution. Training and Standards projects: The third major division of DOJ is Training and Standards. This division includes two NC Justice Academies (NCJA) where training for law enforcement officers and other sworn officers is conducted. The division oversees standards for officers through the Sheriffs' and Criminal Justice Training and Standards Commissions. In addition, the Division oversees standards for private security, private investigators and other related professions through the Private Protective Services Board as well as burglar alarm businesses through the Alarm Systems Licensing Board. Related projects in FY 09-11 include the following: 5 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium  Private Protective Services (PPS) and North Carolina Justice Academy (NCJA) PowerBuilder Application Replacement: Current PowerBuilder software applications, which were custom developed in DOJ need to be rebuilt. Since Power Builder is not a part of the current strategic direction, they will be replaced to adhere to the NCDOJ ITD Standards (MS .NET).  NCJA Multimedia Services- This project will update the NCJA web site to support multimedia presentations, host the multimedia services for both BlackBoard and Learning Management System courses, and establish authoring capabilities to create and design the multimedia elements for the services in NCJA.  Training and Standards Project, Phase 2- Phase I of this project will roll out in 2/09, enabling standardized methods of tracking and collecting training data for criminal justice entities in NC. Phase II will begin in the 09-11 biennium and will incorporate all requirements outside of the original Phase I implementation.  Expansion of NCJA Learning Management System- This project will increase the user base with Learn.com LearnCenter and integrate NCID for single-sign on (SSO) capability, thus increasing the capability to provide online in-service training for law enforcement officers throughout NC. Summary: The DOJ IT division is moving to compress the number of applications in our portfolio so that maintenance becomes more manageable. ITD uses Microsoft primarily and we are making a concerted effort to convert ACCESS, MAPPER, and Power Builder applications to Microsoft .NET applications to reduce maintenance costs and ensure adequate resources for application maintenance in the future. Since DOJ has invested in a Microsoft enterprise license and also hired a good number of skilled .NET developers, this seems to be the logical path for our organization. The priorities above are those that the DOJ supports to meet legislative mandates, to enable the agency to provide greater support to law enforcement, to provide attorneys in the agency up to date software to manage their cases, to adhere to court mandates, and to support other departmental goals. AG Cooper continues to guide the Department of Justice in the direction that provides citizens of NC with the greatest degree of protection, most especially the children of NC. He is a staunch advocate for Victim and Citizen Services, consumer protection, and internet safety. The application plans for the future as described above are guided by the AG’s overall priorities for DOJ. Progress will continue to be measured by adherence to legislative mandates, streamlining of agency processes, enhancements in efficiencies, completion of projects on schedule and within our budget, and user acceptance of IT applications and verification that applications meet the needs of each division to support agency priorities. IT applications are only of value if they meet the needs of the business and reduce the complexities within the business. This is what DOJ ITD strives to achieve. 6 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium II. MAJOR FACTORS INFLUENCING THE PLAN Historical Law Enforcement Information- The support that ITD provides NC law enforcement is very significant. In order to have a complete understanding of the importance of support provided to the SBI and law enforcement, one must first understand the history of how the Law Enforcement Message Switch evolved and what it provides to law enforcement today. The Police Information Network (PIN) was created by N.C. General Statute in the early 1970’s as a division to provide electronic communication between N.C. law enforcement and criminal justice agencies. In addition PIN provided law enforcement access to local, state and federal databases such as the N.C. Department of Motor Vehicles (DMV) Driver License and Vehicle Registration databases as well as the National Crime Information Center’s (NCIC) Stolen Vehicle and Wanted Persons files. Communication of NC law enforcement users with law enforcement users in other states via the National Law Enforcement Telecommunications System (NLETS) was also provided by PIN. PIN procured the computer hardware (UNISYS mainframe) and communication circuits to provide the physical means to make this happen. Corresponding specialized missioncritical computer software was also acquired which has become known as LEMS (Law Enforcement Message Switch). In addition to providing communication among law enforcement, PIN established a state Computerized Criminal History (CCH) database which is accessed through LEMS. As the PIN system matured, PIN evolved into the Division of Criminal Information (DCI) which was part of the State Bureau of Investigation (SBI). Later, as DCI matured even further, the Department of Justice began to realize the advantage of having an internal IT department. DCI was moved directly under the Department of Justice and renamed the IT Division giving us the modern-day name “Department of Justice IT Division (ITD).” In the early 2000’s, ITD moved LEMS from the mainframe environment to an n-tier clientserver architecture with a UNIX based server and then later to a Windows environment which is our current status. During this time, a product called Omnixx was purchased from Datamaxx Applied Technologies. Omnixx is the front end of the message switch and provides NC Law enforcement and Criminal Justice users' access to NCIC, NLETS, and state databases via intuitive transaction forms. Omnixx was put into production in 2003. The transaction forms in Omnixx are accessed from a filtered menu based upon each user's certification privileges, ensuring that users may only access authorized transactions. These intelligent transaction forms are capable of generating multiple queries based on the information provided on one form. In addition, Omnixx provides access to users to enroll in scheduled training classes and access to online certification testing. Other ITD databases where added through LEMS such as the Sex Offender Registration, Concealed Handgun Permits, and Recovered Vehicles. Additional LEMS interfaces were created to other state agency databases such as the Administrative Office of the Courts 7 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium (AOC) and Wildlife’s Vessel Registration. LEMS now has an interface through NLETS to the federal National Oceanic and Atmospheric Administration (NOAA) National Weather Service with immediate weather watches and warning notifications being provided to the NC law enforcement community. The devices used to send and receive messages from LEMS have improved over the years. Newer more user-friendly devices now give users in the field an easier method of entering and receiving message request responses that are easier to read. Mobile devices are now available and message requests and message responses can be transmitted from patrol cars. Current and future technology trends in the LEMS area include state and national standardized message exchange formats through the use of Extensible Markup Language (XML) message formatting technology. XML is recognized across the industry as a common message formatting specification. This facilitates faster development of new applications and interfaces through LEMS. Various interfaces in LEMS are being converted to XML. Another technology trend in LEMS is the introduction of image technology into the law enforcement community. Images are now available from federal databases such as the NCIC Wanted Persons file through LEMS to law enforcement users. Image access through LEMS to other state databases such as the NC DMV driver license photos is also materializing. LEMS now has the capability to exchange these DMV driver license photos with law enforcement users in other states through NLETS. In the future, state DOJ applications such the Sex Offender Registration database may be candidates to provide their photos to law enforcement through LEMS. Business Vision- The Attorney General is very committed to technological advances for the DOJ. As the state's chief law enforcement officer, Attorney General Roy Cooper’s mission for the Department of Justice is to fight crime and protect the people of North Carolina. Though simply stated, this mission has broad reaching implications and is guided by 1) special legislation that impacts the Department of Justice, 2) criminal activity throughout the state which requires the Attorney General’s intervention from a consumer protection or law enforcement perspective, and 3) division stakeholder needs which will enhance the overall efficiency of the department. Overarching goals for the Department of Justice include 1) Strengthening law enforcement and better enabling the SBI and NC law enforcement officers to protect North Carolinians, 2) Apprehending predators and arming the public with as much information as possible to protect them from predatory or criminal activity, 3) Protecting consumers and providing them with sound information to disarm scam attempts, 8 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium 4) And striving to enhance the work flow of employees, improve processes and maintain a sound infrastructure within the DOJ that will allow employees to use their time efficiently to accomplish the goals of the department. Goal #1- The DOJ has made tremendous progress using state of the art technology solutions to strengthen law enforcement and better enable the SBI and local law enforcement to protect the public. ITD devotes the greatest percentage of its time to building and supporting applications related to this goal. From a strategic perspective, providing data in user friendly formats in well architected applications gives law enforcement vital tools that they need on a daily basis to protect the citizens of this state and protect themselves in the performance of their duties. Some of the significant IT applications that law enforcement depends on are listed below. Some historical perspective is provided on these important applications to allow for greater understanding for new staff transitioning into the DOJ as well as other readers of this document. State Automated Fingerprint Information System (SAFIS) - The SBI is mandated by law to serve as the criminal fingerprint repository for North Carolina. Based on this mandate the SBI is responsible for operating and managing the SAFIS, a statewide network that serves approximately 450 criminal justice agencies and thousands of non-law enforcement entities that submit fingerprint cards to the NCSBI. The primary goal of SAFIS is to provide immediate and positive fingerprint identification results to law enforcement agencies in four hours or less. In this current biennium, ITD worked with the SBI to craft an RFP, get a legislative appropriation and contract with Motorola to completely upgrade the SAFIS system. This project has been resoundingly successful and provides new functionality to law enforcement which enhances the ability to match fingerprints and catch criminals. Computerized Criminal History (CCH) - The NC Computerized Criminal History (CCH) application was implemented in 1976 and has arrest, court and custody data as substantiated by the person being fingerprinted. This was part of the FBI effort to automate the “Rap Sheet.” NC criminal history data was housed in both the state and FBI computer. In the early 1980’s, NC legislation was passed for the mandatory fingerprinting of all felonies. This was a requirement so that in 1983, NC could be a part of the first five states for the FBI’s new initiative to create a CCH Interstate Identification Index (III). With the “III” concept, the FBI sent a request to each of the “III” participating states and the state provided its own Criminal History reply data instead of the FBI providing a reply from the FBI database. From 1983 until 1991, the FBI continued to keep a copy of the NC criminal history fingerprinted arrest, court and custody data. In 1991, NC was the second state in the nation where the FBI stopped keeping a copy of the state criminal history arrest, court and custody data. The FBI has only the “III” individual identifying data with a pointer to NC to provide the arrest, court and custody data. The CCH database has information for over 1,300,000 fingerprinted individuals. The NC CCH file is critical to law enforcement throughout the nation on a 7 x 24 basis and requires the ongoing support of a full time developer to maintain the application. Concealed Handgun Permits (CHP)- The 1995 Session of the General Assembly ratified House Bill 90 which allows for certain individuals to carry a concealed handgun if that 9 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium individual has obtained a concealed handgun permit from the sheriff of the county in which they reside. Additional provisions were created in General Statutes and can be found in N.C.G.S. 14-415.10 - 415.23. The 2000 Session of the General Assembly ratified House Bill 1508 which modified the concealed handgun law regarding fingerprint requirements, fees, and renewal requirements. All 100 North Carolina Sheriff departments and the Criminal Information and Identification Section (CIIS) are users of this application. Current work on this application will allow other states to inquire on a NC citizen’s Concealed Handgun status. Local law enforcement and other states will use the law enforcement message switch to share information. Methamphetamine Tracking- Attorney General Cooper has strongly focused on the eradication of methamphetamine labs in NC. According to a portion of the Methamphetamine Lab Prevention Act 2005 legislation, AG Cooper directed ITD to establish a database to collect information on distributors of pseudophedrine who are required to report their sales. It is anticipated that there will be ongoing emphasis in the 0911 biennium on the tracking of pseudophedrine sales and the elimination of illegal methamphetamine labs in NC. Though there are no current plans for additional applications, there is currently discussion regarding the tracking of those who purchase pseudophedrine, the frequency of purchases and the stores where purchases are made. Training and Standards Initiatives- As described in section I, there are two IT projects in the Training and Standards division that provide an important service to law enforcement in regard to their certification. One is the Learning Management system which is a new effort to provide on line courses to law enforcement and the second is a Training and Standards application which consolidates a variety of legacy applications for both Sheriff’s standards and the Justice Academies to track training data for all criminal justice entities. This particular application could eventually allow other agencies to check training information on their criminal justice staff via the computer as opposed to making calls and sending letters as it occurs now. Middleware projects: The DOJ also has several very significant middleware projects in progress that involve multiple agencies and other states. Though these are not DOJ projects, we do have a systems analyst that is very involved in these projects because they impact the Law Enforcement Message Switch (LEMS). Many of the LEMS related projects are supported with federal funding and are national projects where data is shared with other states. Summaries of these projects are noted below. NLETS DOC Image Interface- NLETS in conjunction with SRFERS (State, Regional, and Federal Enterprise Retrieval System) group is creating an entirely new interface in NC from NLETS through LEMS to the NC Department of Correction (DOC) to retrieve DOC text info and images regarding inmates. NC and Oregon are the two initial LEMS pilot states. At present, a Statement of Work (SOW) is being developed with Unisys for LEMS. Federal funding is being provided by NLETS/SRFERS and NLETS funds and manages this project. 10 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium NLETS CHIEF CCH XML Rap Sheet Standardization- NLETS is converting the NC CCH responses to the NLETS standard XML format. This project is referred to as CHIEF (Criminal History Information Exchange Format) which is the NLETS national standard for formatting state CCH rap sheet responses through NLETS. This approach facilitates various states having their CCH responses look similar to the user. Currently Unisys is finalizing the SOW with NLETS. Funding for this project is provided by NLETS. NLETS LoJack DRI ‘MA’ to ‘LJ’- LoJack is an electronic stolen vehicle locater service. NLETS is moving the LoJack server from Massachusetts to NLETS. Currently Massachusetts is performing an automatic stolen vehicle check at NCIC for LoJack since LoJack is not allowed to perform the query to NCIC. States communicate with LoJack via Massachusetts DRI “MA’ through NLETS. States will now have to modify their message switches to perform their own stolen vehicle checks at NCIC after receiving a LoJack notification from NLETS. Since the LoJack server will be located at NLETS, the states will also have to modify their message switches to use the new NLETS LoJack DRI ‘LJ’. Currently Unisys is negotiating the SOW with LoJack. Funding is being provided by LoJack and the project is managed by NLETS. Division of Motor Vehicles (DMV) SADLS (State Automated Driver License System) Temporary Driver Certificate (TDC), NCGS 2005 - GS20-7 (f)5- This project is being managed by the DMV division of the Department of Transportation. The purpose of the project is to allow the issuance of a 20-day Temporary Driver Certification to a person when a driver’s license is renewed or when applying for a license the first time. This 20 day period will be used by DMV to conduct background checks on individuals applying for NC driver’s licenses before mailing the permanent plastic driver license card in the mail. Currently the pilot for this project is underway and ITD has a team member on the project. . DMV SADLS Driver License Images- DMV SADLS is acquiring a stand-alone image server to provide driver license images to law enforcement through LEMS. This approach will prevent law enforcement users from having to access the current DMV production image server. This is a DMV project and DMV is in the server procurement phase. DMV STARS IRP Audit Stop-(Senate Bill 830) - DMV State Title and Registration System (STARS) is being developed to notify law enforcement via LEMS when a DMV stop has been placed on certain vehicles. There is a special vehicle registration process for big trucks, etc that cross borders with neighboring countries such as Canada and Mexico. This is the International Registration Program (IRP). The Department of Revenue conducts audits where they compare miles driven versus miles reported. The audit stop condition occurs when the reported mileage driven is not correct. Currently this project implementation has been delayed in LEMS since the programming changes in LEMS and DMV are associated with the DMV Inspection Sticker Removal project below. DMV STARS Inspection Sticker Removal- House Bill 679- DMV STARS is making system changes since NC inspection stickers will be removed from vehicles. An individual will not be able to obtain a license tag registration or renewal unless the vehicle 11 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium has been inspected. The inspection expiration date will become the same as the license tag registration expiration date. The inspection date will be printed on the registration card since the dates may be different until all stickers have been removed. DOJ involvement in this project (which is being managed by DMV) is to allow Law enforcement notification of inspection sticker expiration through LEMS. DMV is in the business rules phase of this project currently. Goal #2- With the rise in criminal activity related to predatory crimes, particularly sex crimes against children, the DOJ has created a sex offender registry which has a two fold purpose of providing information to the public about the locations of sexual predators and also providing an application to law enforcement which allows for data entry of mandatory data collection related to sex offenders. With the creation of this website in North Carolina, the Attorney General provided a tool to law enforcement and the public in support of this goal to apprehend predators and arm the public with as much information as possible to protect them from predatory or criminal activity. Sex Offender Registry- The new sex offender registry for both law enforcement and the public was rolled out during this past biennium and changes and updates to the registry are ongoing. The sex offender registry has substantial legislative changes at the state and federal level this year that will impact DOJ and specifically the ITD. Current state legislation impacting this application is SL2008-117, HB933, Jessica Lundsford Act for NC; SL2008-220, SB1736, Sex Offender/Registration E-mail Address; and SL2008-218, SB132, Protect Children from Sexual Predators Act. The federal legislation is entitled the Adam Walsh Child Protection and Safety Act of 2006 (Sex Offender Registration and Notification Act-SORNA). This state and federal legislation will require work into the 0911 biennium. The DOJ works diligently to keep the external Sex Offender website easy to use for citizens. There is also a separate SOR application for law enforcement and ITD makes legislative changes that allow law enforcement to track and register sex offenders as required. AG Cooper considers this work some of the most important that we do for NC citizens because it helps keep citizens informed and helps prevent predatory attacks. In the 09-11 biennium, ITD will be working on additional projects in support of goals #1 and #2 above. These projects include Uniform Crime Reporting, Data Integration, NCAT/LEMS integration, N-CATS portal, Mobile AFIS, and CEASE. Work with the SBI lab staff continues on a new laboratory application as well. More detailed descriptions of each of these projects are provided in section four of this document. Goal #3- providing NC consumers with sound information to disarm scam attempts – The AG has implemented programs such as the “No Call” list to make sure North Carolinians have the right to control who calls them at home. The “No Call” list is a national registry and can prevent most telemarketers from calling homes. IT supports the AG’s website and the “No Call” list information is a part of the website. DOJ also has a Medicaid Investigations Unit to investigate and prosecute health care fraud committed by Medicaid providers, the physical abuse of patients and embezzlement of patient funds in Medicaid funded facilities. IT built and supports the “AG Medicaid Fraud 12 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium investigations application” and a full time IT staff person is assigned to the Medicaid unit to support their IT needs. The DOJ Consumer Protection Division works to educate consumers and provide consumer tips on a wide range of topics, from automobiles to work-at-home schemes and everything in between. ITD built and supports the “Managed Care Patient’s Assistance application” for the tracking and processing of patient issues and claims with insurance companies. This falls under the consumer protection umbrella of the Legal Services section. There is no pending legislation requiring changes to this application but the AG depends on ITD to support and maintain the existing application which contains very important information for legal cases that arise. Goal #4- The fourth goal, striving to improve processes and maintain a sound infrastructure within the DOJ that will allow employees to use their time efficiently to accomplish the goals of the department, impacts IT from both an IT infrastructure perspective and from a reengineering perspective. ITD is expected to create a technically savvy environment in DOJ that increases efficiencies in the performance of employees’ jobs and also allows for service improvements within all divisions. This includes sufficient network speed, replacement of computers on a set schedule, a competent Help Desk operation to receive questions as well as process requests for assistance, and a server/security team to manage our data center. There are several projects in legal services planned for the coming two years that relate to this goal: legal services case management system, legal services scanning project, and the collection’s debt management application (summary in section IV). The case management project in particular will result in many benefits because it will provide the first automated system to handle all cases throughout legal services. This is expected to increase efficiency in the department and move the entire legal services division away from paper file documentation to a central repository for all cases. This will benefit not only DOJ but all agencies that have legal counsel through the Attorney General’s legal services division. It is anticipated that the SBI work flow project with also reengineer processes to allow SBI staff to maximize efficiencies. 13 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium III. CURRENT SITUATION AND DESIRED STATE OF IT APPLICATIONS/INFRASTRUCTURE ASSETS, PERSONNEL, PROJECTS, AND MANAGEMENT Application Development- Over the past biennium, the NC DOJ IT division has examined the overall portfolio of the agency and began planning to reengineer applications to eliminate legacy applications, particularly those written in ACCESS, Power Builder and Mapper. With over 100 applications in the portfolio, maintenance and support is a large effort. As mentioned earlier in this plan, several of the applications in process now will eliminate dozens of legacy applications. Future releases to BEACON should also eliminate several legacy Mapper applications. ITD is a Microsoft shop and uses ASP.NET, Biztalk, and C# as a standard for development. Up until three years ago, there was no consistent standard for development. Developers were developing in the language that they knew and also collected requirements, wrote the code, and tested the applications that they built. A new direction has moved staff toward .NET development and toward using a standard SDLC process for application development. ITD is also piloting the use of Microsoft Team Foundation in the Training and Standards application. This new direction has resulted in retraining staff to learn .NET and also in actively recruiting staff that have .NET skills. Three years ago, there was also only one project manager on staff. Today, ITD has four project managers and each is assigned to a specific division within the agency. This allows for familiarity with the business needs of specific divisions. ITD strives for an environment where the business needs drive the work of the IT staff. Law Enforcement requires the most IT resources because of the number of applications related to the SBI and law enforcement agencies. However, significant work is also occurring for Training and Standards and Legal Services to meet their business needs. Two PM’s are assigned to the SBI due to the volume of projects and the associated workload. ITD has been working towards an organization that is aligned with the businesses that we serve. We have strived to do this by making project managers the liaisons between DOJ divisions and the ITD staff. This has worked to some degree, especially with the Legal Services division and the Training and Standards division. However, the number of projects being built and supported for the SBI and law enforcement had prohibited ITD project managers from having enough time to be as effective in this liaison role as needed. More work is yet to be done in this area and a Program Manager position to oversee all of the SBI/law enforcement projects may be required in the future because of the complexity of the work with the SBI. A number of positions have been reclassified over the past two years to create business analysts and testing positions which were previously very limited in ITD. DOJ’s most recent engagement with ITS to participate in the SQA (Mercury testing) service is going to allow for more intense and detailed testing of applications, particularly those that need to be stress tested. The coming biennium will also be used as a time to formalize policies and processes internally in ITD. 14 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium Infrastructure- ITD has recently had all of the Help Desk staff complete training for Help Desk certification. After the training, all staff took the certification test and passed. This training has yielded greater productivity, focus, and pride on the job. In the current biennium, ITD server staff (using both Windows 2003 and Unix Solaris) has focused on expanding the Storage Area Network (SAN) and the disaster recovery setup at MCNC including the installation and configuration of mirror view for disaster recovery. The network team has also established a redundant network connection for law enforcement, using both AT & T and Time Warner Cable. One of the unique characteristics of law enforcement is a very low tolerance for network outages due to the serious life threatening consequences that outages can have on law enforcement. Our network team has also installed a new fiber optic network around the SBI campus. Last year, our PC support team was able to disperse enough laptops to ensure that all SBI agents in the field have a laptop. This has never been the case in the past. We are working toward a standard 4-5 year replacement cycle and are striving to move staff away from using individual printers on each desktop toward using networked printers in a central location. PC support is also still in the process of encrypting all DOJ laptops. In the 09-11 biennium, the infrastructure side of our organization will focus on a written and tested disaster recover plan and continued work on business continuity planning. Intrusion/Detection/Prevention software is being evaluated by the agency for implementation in the next 2-3 years. DOJ is evaluating the benefits of SharePoint and plans are in process to install VM Ware. Network analysis and necessary upgrades to support law enforcement are in processes and conversations are underway with the CFO and the SBI director about needs for the coming biennium. A feasibility study of a wireless campus is planned in the coming year as well. Human resource needs- In recent years, it has been the position of the DOJ CIO to support the IT needs of DOJ with existing resources. We have been very effective at doing this by reclassifying positions to balance out needs within our total division. However, it is obvious now that there are a few significant positions that need to be funded to completely meet the needs of DOJ. These include an additional development position for work associated with the sex offender registry and a position to handle application architecture. The banding of IT positions has helpful to ITD for the most part. It has been helpful in the sense that it has raised awareness within the agency about the market rate for IT positions and has helped secure funds to begin to bring staff to their market rates. However, lack of adequate funds to fully fund banding initially resulted in a number of staff moving on to other state agencies that could fully fund their band. We have particularly experienced high attrition rates for Database Administrators due to salaries issues and are working with DOJ HR to correct this situation. We are also working toward getting an Advanced Database Architect in the future, due to the complexity of the databases in DOJ. 15 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium IV. MAJOR INITIATIVES AND INVESTMENTS Role of ITD- ITD is considered the staff that serves the Attorney General and all divisions of DOJ to analyze business problems and come up with IT solutions that help to further the mission and goals of the department. ITD is counted on to take information from the business, listen to their needs and carefully assess how to improve the efficiency of varying operations with Information Technology. The DOJ CIO sits on the agency’s management team which is facilitated by the Chief of Staff. This is where big picture needs are discussed and where information on the Attorney General’s goals is disseminated. The DOJ CIO also serves as a member of the Technology Planning Group and shares information received from TPG in the DOJ Chief of Staff’s meetings. This helps DOJ management stay abreast of consolidation efforts, enterprise initiatives, and other important information disseminated from ITS. The forum that ITD uses to gather more specific information on stakeholder needs is monthly business meetings with each DOJ division that are facilitated by the project manager assigned to that division. These meetings are used for updates, discussion of new ideas, discussion of needs, and any concerns. This allows ITD to gather information about the high level needs of the agency and to facilitate prioritization of projects. As projects transition from visions to reality, ITD applies the Software Development Life Cycle (SDLC) to manage projects as they come to fruition. Projects listed below have been prioritized by the business for work in the 09-11 biennium: 1) Name/Title of project: SORNA Compliance Summary description: Change Sex Offender Registry (SOR) application and web site to be compliant with federal SORNA requirements. Major Objectives and benefits/value to the agency/state also include performance measures that will be used to track progress against goals and objectives- Primary objective is to become compliant with federal SORNA requirements for managing information on registered sex offenders and providing information to the public. This will facilitate investigation of sex crimes, better protect the public from sex offenders, and prevent North Carolina from being subject to a 10% reduction in federal grant funding for failure to comply with SORNA. Approach for accomplishing it- Project sponsor will be SBI Assistant Director. Project will be performed by DOJ IT staff possibly with assistance from one or two contractors. Non-technical aspects of implementation, such as updating procedures, updating DCI training and documentation, and training Sheriff’s Offices and DOC staff will be performed by SBI CIIS staff. The standard release management process for updating existing DOJ applications will be used to complete this project. 16 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium Timeframe- Most changes to achieve SORNA compliance are expected to be completed in FY08-09 via other legislatively mandated projects impacting the SOR application and website, but new legislation will be required to authorize DOJ to come into full compliance with SORNA. These particular changes to the SOR application and website will begin at the start of FY09-10 and be complete by the end of FY09-10. Relationship with other agencies projects- Impacts Sheriffs statewide as users. May impact Department of Corrections as users and OPUS interface. Not related to any other projects. Relationship w/ statewide initiatives/projects-Not related. Order of magnitude costs - $400,000.00 funded by continuing appropriation for internal staff and grants for contractors. 2) Name/Title of project: Uniform Crime Reporting (UCR) Modernization Summary description- To meet the growing demand for crime reporting in North Carolina, SBI desires to re-architect its current UCR platform to create a scalable, flexible, and easily maintainable solution to meet the current and future analytical, reporting, and data warehousing needs of the SBI. Major Objectives and benefits/value to the agency/state also include performance measures that will be used to track progress against goals and objectives: • • • • • • • • • • • • Deliver more automated and modern mechanisms of data collection. Leverage automation as the mechanism for quality control and consistency in reporting. Provide a system that is scalable for future needs (i.e. different and new types of crime tracking). Provide the ability to integrate UCR data with other data sources. Provide the ability to perform timelier reporting. Provide the ability to publish reports to the web and to print reports in both an ad hoc and scheduled/automated fashion Provide data that is more granular, and expands the ability to perform incident based reporting across all agencies. Create efficiencies that benefit the SBI and the LLEAs. Through the implementation of the enterprise architecture, deliver the ability to easily map to data in a variety of formats. This capability will allow SBI to accept and process data in non-standard formats, where appropriate. Overcome the challenges and resources currently required to submit data through existing SBI forms (e.g., The Incident Report) by allowing the LLEAs to submit data in their existing format to promote “data compliance” v. “form compliance” and encourage more timely and more detailed reporting. Promote an automated process that supports standardization in reporting detail. Reduce or eliminate manual processing for the SBI and for the LLEAs. 17 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium Approach for accomplishing it: Project sponsor will be SBI Director. The scope of the project is as follows: • • • • • • • • Design and re-architect the SBI’s current infrastructure and apply its new capabilities to UCR reporting - the new architecture will migrate the SBI from its current Forte, Business Objects, and Oracle environment to a more modern SAS Technology used for Data Warehouse, ETL, Data Quality, and automated reporting. Evaluate and adjust the business processes required to collect data at an incident level and enhanced data collection from all LLEAs. Install and configure enhanced Data Warehousing, Analytics, and Reporting Technology. Develop automated ETL and Data Quality processes to alleviate the manual management and submission of the current UCR submissions Automate printed creation of Crime in NC Reports Develop an interactive Web Portal for Crime reporting in NC based on data available for UCR. Develop a support plan and Business Intelligence Center of Excellence for the SBI to support Crime Reporting in the State of NC. Architect the system to facilitate the integration of other data sources, analytics, and reporting in additional phases over time. A vendor will perform the bulk of the project work. SBI and DOJ IT will produce procurement documents and complete the procurement process in conjunction with DOJ legal and procurement representatives and SCIO legal and procurement representatives. SBI and DOJ IT will participate throughout the project in requirements gathering, solution design, data migration, quality assurance and testing. DOJ IT will also provide a project manager. The implementation process is expected to flow as follows: Step ONE: Requirements Definition Develop a strategic plan and conduct a gap analysis that further identifies and clarifies the priority tasks, and establish the framework and requirements for the initial release of the enhanced UCR reporting. Step TWO: Design and Analysis Provide the implementation team with the details needed to build the system such as detailed definitions of source systems, a target data model design, source to target data mappings (including business rules and data quality checks), and UCR automated reporting design. Step THREE: Infrastructure Installation and Configuration 18 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium Install and configure the software and components needed to build the system. Step FOUR: Implementation and System Testing Utilize industry standard methodologies and best practices to build data collection and integration processes and routines, and development of reports based on Detailed Design. System testing and iterative customer reviews will be included. Step FIVE: Training and User Acceptance Testing (UAT) Allow user to test system to insure that it meets the defined requirements. User training occurs as part of the UAT process. Step SIX: Roll-out and “Go-Live” The purpose of this phase is to assist the SBI IT department in migrating the enhanced SBI UCR Reporting system to a production environment. This step also includes time for knowledge transfer to DOJ IT support staff to enable them to support and enhance the system over time. Timeframe- Expect project to begin in late 2008 and end in late 2009. Relationship with other agencies projects: Law enforcement agencies statewide will be impacted. This project could impact or be impacted by the Criminal Justice Data Integration Pilot Program. Relationship w/ statewide initiatives/projects: This project could impact or be impacted by the Criminal Justice Data Integration Pilot Program. Order of magnitude costs: $1,300,000.00 funded by continuing appropriation for internal staff and a grant of $173,399. $684,601 of implementation is currently unfunded and that funding is being sought from OSC data integration funds that have been appropriated. 3) Name/Title of project: Criminal Justice Data Integration Summary description- The updated Appropriations Act from the legislature’s short session funded a “Criminal Justice Data Integration Pilot Program.” DOJ will likely need to participate in this project or complete related projects in support of this project. Major Objectives and benefits/value to the agency/state: Unknown at this time. To be determined by Steering Committee. Approach for accomplishing it: Unknown at this time. To be determined by Steering Committee. Timeframe: Unknown at this time. To be determined by Steering Committee. 19 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium Relationship with other agencies projects- Unknown at this time. To be determined by Steering Committee. Will likely impact State and local agencies involved in criminal justice statewide. Relationship w/ statewide initiatives/projects- Criminal Justice Data Integration Pilot Program Order of magnitude costs- Unknown at this time. To be determined by Steering Committee for Data Integration established in State Controller’s office. 4) Name/Title of project: NCATS – LEMS Integration Summary description- Create interface between North Carolina Applicant Tracking System (NCATS) and Law Enforcement Message Switch (LEMS) for automating exchange of information necessary for completion of fee-for-service and civil applicant criminal background checks performed by SBI Criminal Information and Identification Section (CIIS). Major Objectives and benefits/value to the agency/state- The objective of the NCATS LEMS Integration project is to automatically perform the LEMS query portion of a background check using data already entered by the user in an earlier step as well as data returned from SAFIS. The results returned by LEMS will be automatically processed by NCATS and used to update the NCATS record with the only human intervention being quality assurance. This will reduce applicant processing workload in CIIS by approximately 4 FTE’s by eliminating manual running of the LEMS query and updating/attaching of results and supporting batch fulfillment of hits (in addition to no-hits which are already fulfilled in batch). Approach for accomplishing it- Project sponsor will be SBI Assistant Director. Project will be performed by internal DOJ IT staff and a contractor. Project will be conducted using DOJ’s standard processes for project management and systems development lifecycle. Timeframe- Start date to be determined. Project should take 6 months to complete if staffed as expected. Relationship with other agencies projects- None. Relationship w/ statewide initiatives/projects- None Order of magnitude costs- $250,000.00 funded by continuing appropriation for internal staff and either lapsing salary or grant for contractor. 5) Name/Title of project: NCATS Portal 20 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium Summary description- Provide a secure web portal for agencies to request fee-for-service and civil applicant background checks performed by SBI Criminal Information and Identification Section (CIIS), monitor the status of these requests, and retrieve the results. Major Objectives and benefits/value to the agency/state• • • • Reduce data entry by CIIS staff. Reduce staff, paper, and postage costs associated with fulfilling fee-for-service and civil applicant background checks. Provide agencies with results of fee-for-service and civil applicant background checks more quickly. Maintain compliance with FBI CJIS Security Policy. Approach for accomplishing it- Project sponsor will be SBI Assistant Director. Remainder of approach is to be determined depending on resource availability. Project could either be outsourced or completed by internal DOJ IT staff perhaps with contractor assistance. Timeframe- Start date to be determined. Project should take 9 months to complete. Relationship with other agencies projects- None. Relationship w/ statewide initiatives/projects- None. Order of magnitude costs- $500,000.00 with funding sources to be determined; could result in expansion budget request. 6) Name/Title of project: SBI Information Flow Study Summary description- Assess the flow of information between organizational units and systems within SBI and make recommendations for improvements in processes and information systems. Major Objectives and benefits/value to the agency/state- Determine how SBI processes and the systems that support them can be improved to more optimally support SBI’s mission. Define projects to implement these changes and help drive the IT Plan for the remainder of this biennium and beyond. Approach for accomplishing it- Project sponsor will be SBI Director. Remainder of approach is to be determined. Timeframe- To be determined once more information on scope is obtained. Relationship with other agencies projects- None. Relationship w/ statewide initiatives/projects- None 21 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium Order of magnitude costs- $300,000.00 with funding sources to be determined; could result in expansion budget request. 7) Name/Title of project: Mobile AFIS Summary description- Procure and distribute mobile devices for law enforcement agencies to capture fingerprints and create new workflows in existing Statewide Automated Fingerprint Identification System (SAFIS) to process these fingerprints, interface with other systems (FBI IAFIS, CCH, etc.), and provide results back to law enforcement agencies. Major Objectives and benefits/value to the agency/state- The scope of this project is still being discussed, but implementation is expected to provide law enforcement vastly improved capabilities to identify individuals at roadblocks, during sweeps, and in other circumstances in the field where definitively determining an individual’s identity is essential for protecting the safety of the public and law enforcement officers themselves as well as allowing law enforcement officers to function more efficiently. Approach for accomplishing it- Project sponsor will be SBI Assistant Director. Project implementation will be outsourced. Remainder of approach is to be determined. Timeframe- To be determined once more information on scope and funding is obtained. Project will likely take on the order of 12 months to complete. Relationship with other agencies projects- None. Relationship w/ statewide initiatives/projects- None. Order of magnitude costs- Depends on scope of implementation but likely between $500,000.00 and 1,500,000.00 with funding sources to be determined; expansion budget request is anticipated. 8) Name/Title of project: Cybercrime CEASE for Western and Triad Labs Summary description- Procure and implement Cybercrime Computer Evidence Analysis and Storage Environment (CEASE) for Western and Triad Labs. Cybercrime CEASE is already being implemented in the Raleigh Lab only in FY08-09 using federal grant funding. Major Objectives and benefits/value to the agency/state- This project would support establishment of digital evidence sections at the Western and Triad labs and allow SBI to expand the number and types of digital evidence cases it accepts beyond the murder and sex crime cases to include other felonious crimes for which digital evidence may support investigation and prosecution. 22 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium Approach for accomplishing it- Project sponsor will be SBI Lab Deputy Assistant Director. Since a Cybercrime CEASE solution will already be implemented at the Raleigh lab, an IFB or RFQ will be issued to provide the same solution at the Western and Triad labs. This would be an outsourced project. Timeframe- Start date depends on securing funding, which would likely come via federal grants. Project should take no more than 6 months to complete. Relationship with other agencies projects- None. Relationship w/ statewide initiatives/projects- None. Order of magnitude costs- $800,000 with funding sources to be determined (could involve grants through Governor’s Crime Commission or expansion budget request). 9) Name of Project- Private Protective Services (PPS) and North Carolina Justice Academy (NCJA) PowerBuilder Application Replacement S Current custom developed PowerBuilder software applications, are outdated and PowerBuilder is no longer a supported programming tool in ITD. ITD recently hired a contractor and provided support for legislative changes in the PPS PowerBuilder application. However, this project will be to replace the outdated PowerBuilder applications with equivalent software applications adhering to the NCDOJ ITD Standards. The applications will also be improved to be in-line with ITS Information Security Policies and SB1048 (2004) Identity Theft Protection Act. This includes utilizing a non-Social Security Number (SSN) as the primary index/identifier and storing in an encrypted fashion. u m m a r y D e s c r i p t i o n - Major Objectives and Benefits/Value to Agency/State- Replace the PowerBuilder application and improve the information security configuration to support the PPS and NCJA business processes respectively. Approach for Accomplishing ProjectMilestones: Kickoff meeting PPS and NCJA PowerBuilder Applications Stabilized and Critical Issues Resolved PPS and NCJA PowerBuilder Application-Requirements Specification Documents (two separate documents) Review and Signoff on the Requirements Specification Documents from Business Stakeholders (NCJA and PPS) Software Technical Design Documents (two separate documents) RFI (if preliminary market analysis reveals that COTS should exist) Make or Buy Decision RFP (if Buy Decision) • • • • • • • • 23 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium • • • New Software Application (replacing PPS and NCJA PowerBuilder Applications) User Acceptance Testing (UAT) Transition to Production (and deactivating the PowerBuilder applications)  Project Close milestone Timeframe- Approximately 14 months from project start date, to be started in calendar year 2009. Relationship with other Agencies’ IT Projects- None. This is primarily an operational risk reduction/elimination project for NCDOJ ITD. Relationship w/ statewide initiatives/projects- None Order of magnitude costs- Under $500,000 (funding source to be determined) 10) Name of Project- NCJA Multimedia Services Summary Description- NCJA has requested the ability to host video and audio multimedia presentations and files for both public and specific law enforcement training. This training is for both Learning Management System online and Blackboard classroom training. This project will update the NCJA Web Site to support multimedia presentations, including podcasting; hosting the multimedia services for both BlackBoard and Learning Management System courses; and establish authoring capabilities to create and design the multimedia elements for the services in NCJA. Major Objectives and Benefits/Value to Agency/State- To provide multimedia services to NCJA in order to deliver classroom and on-line courses more effectively and efficiently. Benefit/Value to Agency/State- Most of the universities and online law enforcement training vendors already offer multimedia services as a standard repertoire when students enroll in any course. This project would permit NCJA to provide the same if not better level of training to the NC law enforcement community. Approach for Accomplishing Project- Milestones: Kickoff meeting Determine requirements Review and Signoff with NCJA Determine design with ITD and ITS Review and Signoff with NCJA, ITD, and ITS Implement solution User Acceptance Training (UAT) Transition to Production with Project Close • • • • • • • • Timeframe- Estimated 8 months from start of project. Expected to start in 2010. 24 N. C. Department of Justice Information Technology plan for 2009-2011 Biennium Relationship with other Agencies’ IT Projects- None. This is strictly for NCJA, however other agencies may be involved as students. Order of magnitude costs- Under $500,000 (funding source to be determined) 11) Name of Project- Training and Standards Conversion Project, Phase 2 Summary Description- This is to address all out of scope and enhancements from T&S Conversion Project (phase 1, which is currently being completed). Enhancements will include undercover security codes, reactivation of records, efficiency of logout and log in capacity, navigation features, addition of new fields, navigation fields, and user administration. Major Objectives and Benefits/Value to Agency/State- The main objective is to address all out of scope, open issues, and enhancements from the T&S Conversion Project, phase 1, software development efforts. This will permit the new application for CJ and Sheriff Standards to be complete and up-to-date in fulfilling the business requirements, which had evolved during the phase 1 project timeline. Approach for Accomplishing Project- Milestones: Kickoff meeting Confirm and Prioritize Out of Scope and Enhancement List with Business Stakeholders. Requirements Specification Document Review and Signoff on the Requirements Specification Documents from Business Stakeholders Software Technical Design Document (from ITD; from both Application Development and Database Administration) Updated Software Application and Database Structure Functional Build, QA Testing, and User Acceptance Testing (UAT) Transition to Production  Project Clo

Useful suggestions for finalizing your ‘Realtor Association Of The Fox Valley Residential Lease Form’ online

Are you fed up with the inconvenience of handling paperwork? Look no further than airSlate SignNow, the premier eSignature solution for both individuals and enterprises. Bid farewell to the monotonous task of printing and scanning documents. With airSlate SignNow, you can seamlessly finalize and authorize paperwork online. Take advantage of the robust features that come with this intuitive and cost-effective platform and transform your document management strategy. Whether you need to authorize forms or gather signatures, airSlate SignNow manages it all effortlessly, requiring just a few clicks.

Adhere to this comprehensive guide:

  1. Access your account or initiate a free trial with our platform.
  2. Click +Create to upload a document from your device, cloud storage, or our template collection.
  3. Open your ‘Realtor Association Of The Fox Valley Residential Lease Form’ in the editor.
  4. Click Me (Fill Out Now) to finish the form on your end.
  5. Include and designate fillable fields for others (if needed).
  6. Continue with the Send Invite settings to solicit eSignatures from others.
  7. Save, print your copy, or convert it into a reusable template.

Don't worry if you need to work with your colleagues on your Realtor Association Of The Fox Valley Residential Lease Form or send it for notarization—our solution has everything you require to accomplish such tasks. Sign up with airSlate SignNow today and elevate your document management to a higher level!

Here is a list of the most common customer questions. If you can’t find an answer to your question, please don’t hesitate to reach out to us.

Need help? Contact Support
Realtor association of the fox valley residential lease form pdf
Realtor association of the fox valley residential lease form download
Realtor association of the fox valley residential lease form free
Chicago Association of REALTORS forms
Mainstreet ORGANIZATION of REALTORS residential Lease
Chicago Association of REALTORS lease application
Chicago Association of Realtors 2025 lease
Three Rivers Association of REALTORS
Sign up and try Realtor association of the fox valley residential lease form
  • Close deals faster
  • Improve productivity
  • Delight customers
  • Increase revenue
  • Save time & money
  • Reduce payment cycles