11.07.2015 Views

RFP VOL-I.pdf - National Crime Records Bureau

RFP VOL-I.pdf - National Crime Records Bureau

RFP VOL-I.pdf - National Crime Records Bureau

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CCTNS Functional & Technical SpecificationsProviding SecurityPrimary Actors:Secondary Actors:Description:Trigger:Applicant, SBSP/DIG/ IGPProviding SecurityApplicant puts in application in white paper/verbal order fromHigherPreconditions: 1. Applicant puts in application in white paperNormal Flow: 1. Applicant puts in application in white paper to ADGP2. ADGP forwards requests to IGP3. IGP forwards requests to SP or DIG4. SP or DIG forwards request to SSRC5. SSRC conducts threat perception6. If approved, SP is notified7. SP notifies branch in charge for security cover8. Applicant receives securityAlternative Flows:1. Payment if required is provided to Special Branch2. For VIP security, information is passed from Delhi & SParranges for securityAverage time1. For normal cases 7-15 days2. For VIP 1-3 daysProcess Flow Diagram for Providing Security:Assam Police Page 111

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!