Agencies and public enterprises who have been trusted with the public resources are answerable to the fiscal and the social responsibility that has been assigned to them yet mainstream news is inundated with cases of fraud, mismanagement, and manual-prone errors in record keeping and reporting in cities and governments around the world.
Working with a vast array of Inspectors General, Column has developed the leading investigative case management solution that allows for best practice processes. Organizations using Column Case Investigative have already achieved the following:
Manage your cases in a single, unified platform
From incident intake through case resolution and possibly to DA turnover, all of your data including audio, video, pictures, documents, files, associated evidence is in one unified tool. Through our data visualization feature, all aspects of the case are tied in an easy to view interface.
Search and access all data sources in one place
Out of the box full text search engine can search Complaints, Cases, People, Sites, Property, Vehicles, Journals, and Attachments from a single Google® type search. This search engine can also be configured to search other databases and network directories. This provides a single point of searching, relating, and viewing for multiple systems.
Duplicate Management and Data Reconciliation
The last thing needed in investigating a case is duplicate data. Users are now able to see duplicate data when searching or creating a record. Reconciliation of data can be done by looking at the grouped records and having the option to join them.
Create reports for effective management of your investigations
With integrated reporting features there is no need to manage user’s permissions or accounts in another application. Users can launch dashboards, canned reports, or Ad Hoc reporting straight from the system.
Quickly determine case prioritization
Detectives will now be able to quickly determine what cases have a high solvability factor or have a high priority. It does this by using predefined factors or by defining custom factors. Priorities can then help determine appropriate response thresholds.
Protect privacy and meet audit compliance and regulations
The solution was built with individual, group, and row level security while automatically tracking all activity including: successful and failed logins, records created, records modified, records deleted, records viewed, field level changes, and approval activity. Cases can also be bookmarked to watch for activity.