Introduction to Disaster Management Interoperability Services DMIS - PowerPoint PPT Presentation

1 / 28
About This Presentation
Title:

Introduction to Disaster Management Interoperability Services DMIS

Description:

3. Enter name, address of operator in appropriate fields. ... Modify data as necessary in fields provided. ... Recommend new passwords at least every 90 days. ... – PowerPoint PPT presentation

Number of Views:148
Avg rating:3.0/5.0
Slides: 29
Provided by: scottey7
Category:

less

Transcript and Presenter's Notes

Title: Introduction to Disaster Management Interoperability Services DMIS


1
Introduction to Disaster Management
Interoperability Services (DMIS)
2
Brief HistoryResponders Needs
  • The systems we have cant talk to each other
  • Most of us dont have budgets for software
  • Per executive-level course at NFA
  • Common operating picture at ICP and EOC
  • Incident documentation
  • Media relations

3
Brief HistoryResponders Information Problems
City A
City B
Emergency Manager
Organization to organization interoperability
tends to be inefficient
Emergency Manager
Emergency Operations Center
Civil Support Team A
4
Brief HistoryResponders Vision
  • Leverage technology to gain efficiency
  • Develop a national emergency information
    interoperability service enabling horizontal and
    vertical data sharing

Nation
Region
State
EOC
EOC
Local
ICP
5
Description
  • Open Platform for Emergency Networks (OPEN) an
    interoperability backbone that lets systems talk
    to each other
  • Nationally scalable and secure
  • Gives responders freedom to choose software that
    best suits their needs
  • Provides access to common services supporting
    basic automated tools
  • DMIS Tools - basic automated tools
  • CAP Alert Messages
  • Tactical information exchange
  • Mapping
  • Private Messaging

6
NIMS Concepts and Principles
  • CAP Compliant
  • OPEN Ready
  • Other approved messaging standards
  • EDXL-DE
  • EDXL-HAVE
  • EDXL-RM

7
What is a COG?
  • An agency or group who needs to
  • Coordinate actions
  • Share information based on accepted standards
  • Collaborate within the common operating picture
  • Eligible to register for DMIS
  • Local emergency management
  • Fire departments
  • Police departments
  • Emergency medical services
  • School systems
  • Hospitals/Medical systems
  • Public health departments
  • State Agencies
  • Federal agencies
  • Military
  • Tribal

8
Registering for a New COG
  • Register at www.disasterhelp.gov
  • Select Disaster Management,
  • DMIS Tools,
  • Step 4 register for a COG, Registration Form. C
  • omplete / submit form.
  • Be patient for 1 to 2 weeks while DMIS
  • Verifies your eligibility
  • Creates your COG in DMIS database
  • Creates your initial COG Administrator
    id/password
  • Tests COG and id/password
  • Emails information to get started

9
DMIS Initial Configuration
10
DMIS Initial Startup
11
DMIS Login
12
DMIS Startup
13
Session Conclusion
Questions?
14
Session Conclusion
Please contact the training and outreach team if
you require future assistance. Contact
Information Tom Ferrentino tom.ferrentino_at_eyestre
et.com (716) 913-4453 Rick Hauschildt rick_at_eyestr
eet.com (703) 201-2609
15
DMIS COG Administrator CourseDMIS Web
Services Release 2.3
16
Common Administrator (Responsibilities)
  • As an Administrator you will
  • Modify Desktop Settings
  • Configure computers for COGs
  • Create and maintain Operator accounts
  • Create roles and privileges in Operator accounts
  • Set and change passwords
  • Deactivate Operators
  • Run administrative reports

Leading the Way
17
Desktop Settings
  • Desktop Settings
  • Start up
  • Time Zone
  • Desktop
  • Network

18
Desktop Settings
19
Setting COG Configuration
Access the COG Configuration screen from the
DMI-Services drop-down menu by selecting DMI-Serv
ices ? Administration ? COG Configuration
20
The COG Profile
21
Operator Profiles(Add a New Operator)
22
Operator Profiles (Add a New Operator)
1. Select Operator Profile from Administration
menu.  2. Click New button or select New from
File menu. 3. Enter name, address of operator in
appropriate fields. 4. Assign Operator ID per
strong password guidelines. 5. Enter contact
information via Add button use drop down menu
for Type and Value (number). 6. Assign
privileges to the operator.   7. To allow access
to sensitive data, select Sensitive Data Access
for TIE. 8. To make COG POC, select Display as
Point of Contact may have multiple POCs. 9. To
activate, select Operator Activated
checkbox. 10. Select Save from File menu, or
click Save button. 11. To close, select Exit
from File menu or click Close button.
23
Operator Profiles(Assigning Roles and Privileges)
  • To assign a role to an operator
  • Make sure correct operator is selected in list of
    operators in left pane.
  • Select radio button that corresponds to
    appropriate role for application.
  • Select radio button corresponds to appropriate
    role for sub-application (if available).
    Roles/Privileges list is a hierarchy.  You must
    assign role to higher application level before
    selecting roles at sub-application level.

24
Operator Profiles(Modify an Operator Profile)
  • Select Operator Profile from Admin menu.
  • Select name of Operator profile to edit.
  • Modify data as necessary in fields provided.
  • If Operator is COG POC, select Display as COG
    Point-Of-Contact checkbox.
  • Select Save on File menu or click Save icon.
  • If you fail to save changes, Confirm Operator
    Selection message opens.
  • Click Yes to disregard changes No to reverse
    changes Cancel to return to Operator Profile.

25
Operator Profile(Changing a Users Password)
  • Change users password using Operator Profile
    screen. Recommend new passwords at least every
    90 days.
  • DMIS uses strong passwords per DHS security
    policy.
  • Passwords must be
  • - minimum of 9 characters, maximum of 20
    characters
  • 1 upper case, 1 numeric, and 1 special character.
  • Passwords cannot
  • - consist solely of periods, spaces or _at_ sign
  • cannot have leading or trailing periods or
    spaces.
  • Jomyrg1n is an example of a valid strong
    password.
  • The following special characters cannot be used
  • A leading space
  • A trailing space
  • ,



26
Operator Profiles(Deactivate an Operator)
.
27
Generating Administrative Reports
28
Questions? Tom Ferrentino Outreach and
Training Tom.Ferrentino_at_eyestreet.com (716)
913-4453
Write a Comment
User Comments (0)
About PowerShow.com