CWDS Glossary

The CWDS Glossary includes a List of Acronyms and defined terms captured from various models, reports, and other artifacts pertaining to the Child Welfare System – California Automated Response and Engagement System (CWS-CARES) Project. The Glossary standardizes terms used across the various project disciplines; each term is defined with its meaning specific to the project domain.

The State may update the CWDS Glossary at any time. Any questions please contact CWDS Communications.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Independent Project Oversight Report (IPOR)

The Independent Project Oversight Report (IPOR) is used by the IPO to record and communicate independent assessment to the project as of a particular reporting period. The IPOR also provides valuable information to other interested parties (Legislature, Department of Finance, California State Auditor, stakeholders, etc.). It is important to note that the IPOR is a point in time assessment used to provide relevant, factual information about an IT project as of a particular date. The goal is to effect positive change, mitigate risks, provide intervention and course corrections, and ultimately help a project achieve success.

Independent verification & validation (IV&V)

A comprehensive review, analysis, and testing, (software and/or hardware) performed by an objective third party to confirm (i.e., verify) that the requirements are correctly defined, and to confirm (i.e., validate) that the system correctly implements the required functionality and security requirements.

Indian Ancestry

Encompasses decent from both historic tribes as well as federally recognized tribes. When establishing descent from an Indian tribe for membership and enrollment purposes, the individual lineally descends from an ancestor who was a member of a federally recognized tribe from which the individual claims descent. Many tribes utilize blood quantum standards for membership and count documented Indian blood from all historic tribes.

Indian Child Welfare Act (ICWA)

In 1978, Congress passed the Indian Child Welfare Act (Public Law 95-608, November 8,1978) to: protect the best interests of Indian children promote the stability and security of Indian tribes and families by the establishment of minimum federal standards for the removal of Indian children from their families, and the placement of such children in foster or adoptive homes which will reflect the unique values of Indian culture provide assistance to Indian tribes in the operation of children and family service programs (25 United States Code Section (1902)). The Act sets forth jurisdictional provisions governing a tribe’s right to exercise authority over its tribal children; sets forth standards and procedures applicable to designated state court proceedings involving custody of Indian children; establishes rights and processes for adopted Indian child to access birth information necessary to establish tribal membership; and authorizes tribal services for Indian children.

Information Architecture (IA)

Focuses on organizing, structuring, and labeling content in an effective and sustainable way. The goal is to help users find information and complete tasks. To do this, you need to understand how the pieces fit together to create the larger picture, how items relate to each other within the system.

Information Exchange Package (IEP)

A data exchange that represents the products and specifications used to facilitate the exchange of information between one or more information exchange partners.

Information Exchange Package Document (IEPD)

A description of specific information exchanged between a sender and a receiver. The Information Exchange Package is usually coupled with additional documentation, sample XML instances, business rules, and more to compose an IEPD. An IEPD is the final product of the National Information Exchange Model development process, also known as the IEPD Lifecycle.

Information Security Officer (ISO)

The ISO is responsible for overseeing the institution’s information and data security. This is a program management role that should function in partnership with both IT and business leadership.

Information Technology (IT)

The study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information.

Information Technology Office (ITO)

Branch of OSI that provides and oversees all aspects of computer hardware and software, phone, and network technology for OSI. This includes maintaining a secure network to protect the department and employees from hacking, determining the best computer hardware and software to support the department’s work, overseeing the distribution and licensing of software and hardware while providing direct technical support to OSI employees. Works closely with the Information Security Office (ISO) and Business Services Office (BSO).