Siebel Public Sector Guide > Managing Investigative Cases >
Developing a Case for an Investigation
If an incident requires further investigation, it is escalated to a case file. Investigators can create a case from an incident record's More Info form, and they can create cases unrelated to incidents, using the Cases screen. This task is a step in Process of Managing Investigative Cases. To create a case record
- Navigate to the Cases screen > Case List view.
- In the Cases list, create a record, and complete the fields.
- In the Case form, enter additional case details.
The following table describes some of the fields.
|
|
Name |
Descriptive name for the case. |
Case Number |
Automatically generated unique number. |
Status |
The status of the case indicates whether the case is still being worked. Values include Active, Closed, and Inactive. The default value for a new case is Active. When the Status is set to Closed, all other fields in the case record become read-only. |
Sub-Status |
Used to further define the case status. For example, for cases with a Status of Active, the choices for substatus could be Appealed, Intake, Screening, Referral, and Assessment. |
Team |
The owner and members of the team assigned to the case. Defaults to the case record creator. |
Type |
The kind of case that is being processed. Case types typically are specific to the agency deploying Siebel Public Sector. Examples are Fraud, Organized Crime, and Public Health. |
Stage |
Used to define the step in the process lifecycle for the case. Examples are Intake, Investigation, and Screening. |
Suspect |
A list of available suspects. You can also create a new suspect record. |
Group |
A list of available groups. You can also create a new group record. |
Reward |
Remuneration associated with case information. |
Date Opened |
Automatically completed with the date and time the case record is created. |
Date Closed |
Date and time the case is closed. |
Threat Type |
Used to group similar threats. Examples are Murder, Kidnapping, and Cybercrime. |
Threat Sub-Type |
Used to further define the threat, based on the threat type. The values in this list are dependent on the value selected in the Threat Type field. |
Threat Level |
Predefined levels used to escalate threat. Examples are High, Medium, and Low. |
Classification |
Classifications include Unclassified, Classified, Secret, and Top Secret. |
Description |
Text field for additional information. Click Check Spelling to verify spelling in the Case Description field. |
|