Every law firm requires continuous access to robust technologies and high-level accounting and technical personnel typically in abundance in large law firms.
The need for good record-keeping and information-sharing practices has taken on added significance in today’s global environment. Not only do good records provide crucial internal information law enforcement agencies now need to communicate agency-to-agency and across continents in order to protect the Nation’s citizens. Nothing is more important to accomplishing that mission than having accessibility to accurate and timely records. Calls for service records and investigative, arrest, criminal identification, detention, and even civil records hold information that by themselves mean little; however, when pieced together with information from other jurisdictions, the result can help with all levels of investigations and aid in safeguarding the Nation.
electronic files directly related to law enforcement operations such as incident and accident reports, arrests, citations, warrants, case management, field contacts, etc.,
A Law Assistant is a system that provides for the storage, retrieval, retention, manipulation, archiving, and viewing of information, records, documents, or files pertaining to law enforcement operations. Law Assistant covers the entire life span of records development—from the initial generation to its completion. An effective Law Assistant allows single entry of data, while supporting multiple reporting mechanisms.
What exactly is an incident/offense report?
Typically, an incident/offense report reflects the following information:
- Persons attacked: the number of victims; their age, sex, and race; and when possible, their occupations.
- Property attacked: the type of premises in which the offense was committed, such as drug store, grocery store, gasoline station, etc. If a building is used for several different purposes, the first purpose for which the particular room entered is used is typically indicated; after that, the general use of the building.
- How attacked: the general manner in which the crime was committed. If a burglary occurred, state the location of the door or window by which entrance was gained. In a robbery case, indicate whether the victim was threatened, strong-armed, etc. For a theft, specify the place from which the property was stolen, such as a desk, cash register, car, porch, etc.
- Means of attack: any instruments, tools, or devices used in attacking persons or property. In burglary cases, all tools should be specifically described, showing for instance the size of a jimmy or a drill. In robbery cases, the best possible description of the weapons should be given. In theft cases, the means of attack may be the carrying away or driving away of property, shoplifting, etc.
- Object of attack: in crimes against property, the property stolen will be the object of attack. The specific type of property, such as money, jewelry, clothing, silverware, etc. should be shown. In crimes against person, the object of attack will be expressed in terms of the motive illicit love affair, robbery, quarrels, etc.
- Trademark: any peculiarity in the commission of the crime which might aid in distinguishing it from other generally similar crimes.
- Vehicle used: as completely as possible, include the year, make, model, color, type, vehicle identification number (VIN), and license plate number of any vehicle used in the commission of a crime.
- Suspect: descriptive data of the suspect, such as the age, sex, and race. Also, other descriptive data such as the height, weight, identifiable scars and marks, geographical accents in speech, body odors, or anything which might be helpful in later identifying the suspect is typically included.