The underlying software is designed specifically for meeting the item management requirements of law enforcement and local governments, blending the benefits of indexing (tagging), bar coding and RFID to lock-down chain of custody and provide RFID evidence tracking.
The user interface is configured according to each customer’s preferred terminology/database fields and is designed to automate workflow consistent with current or preferred operational practices. Since the software is configured according to user requirements and design input, the software is easy to learn and easy to use, even for staff with limited computer skills. A single database license and server allows unlimited item-types to be configured within the software, to meet even the most demanding roll-out across local law enforcement and/or county government applications.
RFID radio frequency technology is achieved by placing RFID tags within or on items that are to be tracked. The RFID tag is passive and does not emit a signal. The tag # is linked to each item’s serial # or ID #. When a RFID reader ‘reads’ items that are tagged/labeled, the radio wave powers the RFID transmitter (computer chip within the label) and sends back a message to the RFID reader identifying the item and its location.
Portable RFID readers are typically used to for rapid RFID evidence tracking and to find items that are ‘missing’. Fixed RFID readers can be placed around doorways, or at any physical choke-point, to saturate walk-thru areas with radio waves to read/identify people and item(s) within proximity. Sirens, alarms, lights or more advanced access control and surveillance systems are available to control and monitor access to sensitive items.
Labels include RFID and bar codes for items (evidence, assets, records, etc.) and locations (shelves, rooms, vehicles, etc.) to track the exact locations of all items. RFID scans update the database and audit logs with item, person, place, direction, time and date.
The software can be configured to model individual items, item life-cycle management (maintenance/retention/disposition), officers/people and events. Complex parent-child database structures and data dependencies can be configured into the database schema. Actual data fields and content are configured around customer-specific requirements.