Investigations can be challenging enough without having to worry about how to keep everything organised, accessible, safe and secure. With advances in technology, it’s becoming easier to quickly capture data and retrieve information about case investigations, and simultaneously it has become easier for a case management system to be breached.
AIMS is deployed as Software as a Service (SaaS) within a dedicated and private cloud environment. Private cloud is ideal for all the investigation institutions or companies because private data needs to be stored and processed whilst these companies carry out sensitive tasks. For example, a private cloud service could be utilized by a financial company that is required to store sensitive data internally and who will still want to benefit from some of the advantages of cloud computing, such as on-demand resource allocation.
Furthermore, in a private cloud, environment is flexible, there’s guaranteed resource availability and higher level of security and privacy through both company firewalls. Internal hosting ensures that operations and sensitive data are not accessible to third-party providers.
For a user to login and use the system, secured logins credentials are required and checked against the user table in AIMS database. The system also have a map that indicates the locations of the incidents that have been reported by the reporter. AIMS is designed as a closed-loop case to reduce errors and improve stability.
The word itself “investigation” implies that the job done by that organisation is delicate thus safety and security is essential. AIMS is delivered via Hypertext Transfer Protocol (HTTPS) for secure communication between the various client interfaces and AIMS, encrypted by Transport Layer Security (TLS).
With all the data having been stored in the AIMS software system, access to information is far quicker for the investigation company. Should a case reach stages where documents uploaded on the system need to be signed, for example – the documents are needed in court as evidence, AIMS provides for electronic signatures. The signature is then used to validate or provide the identity of the person sending the documents, to ensure that the original document sent is not tampered with.