1
Fundamentals, functionalities, and
technical status of ISLA
National workshop on CIM and Computerization for pro-poor and speedy
land administration in Ethiopia
byShewakena Aytenfisu
Land Information Expert
E-mail: [email protected]
EPLAUA
2
Contents
• Fundamentals of ISLA
• System Functionalities
• System security
• Technical status
• Legal matters
• Lesson learned
• Challenges
3
Fundamentals of ISLA
• A tool for the Woreda
• One data entry at the source
• Promote Standardization
• Easy access & retrival of information
• Cost reduction of space for storing land records
4
Fundamentals …• Facilitate quick and easy updating
• Information becomes more secured
• Multi purpose use of the information
• Promote informed decision
5
System Functionalities• User Authentication
−3 categories• Read only … 10• Data clerk … 20• Data confirmation …
30
• Registration • Holding identification• Holder particulars• Parcel details• Easement • Rent and/or lease
• Strong Data verification
and validation protocol
6
Functionalities…
•Updating transactions
•Transferring holdings
•Transfer a Parcel
•Divide a Parcel
•Merge Parcels (under development)
7
Functionalities…
• Data cleaning • Remove a Parcel
• Remove holdings• Reorder Kebele
ID• Jumble Holding
ID up and down• Collapse Parcel
8
Functionalities…• Data transfer
− Textual and spatial dataset linked
• Import− Kebelecalc survey
data
• Export− Arcview− KebeleCalc− Excel
9
Functionalities…
• Report mining−Search engine
• 6 major criteria
−Different report formats
• List of holders (to sub Kebele level)
• Book of holding printout
• Book of register datasheet
• Parcel history report• Lease, etc
10
Functionalities…
•Data storage−Woreda Master DB−Data aggregation at Regional and Zonal level−Backup … running pre-developed database script
•On the PC•On the backup device
BACKUP Database.lnk
Region
DB
ZDB ZDB ZDB
ww w w w w
11
System securityWhat Principals?
Principals
Server RoleSQL Server Login
Windows GroupDomain User AccountLocal User Account
UserDatabase RoleApplication Role
SQL ServerSQL Server
DatabaseDatabase
WindowsWindows
SecurablesPermissions
12
What Are Securables?
Server RoleSQL Server Login
Windows GroupDomain User AccountLocal User Account
SQL ServerSQL Server
DatabaseDatabase
WindowsWindows
FilesRegistry Keys
Server
Schema
Database
SecurablesPermissions
Principals
UserDatabase RoleApplication Role
13
What Are Securable? ...
Device Lock
DatabaseDatabase
WindowsWindows
All I/O ports are blocked
Backup devices secured
SecurablesPermissions
Principals
True crypt
14
Technical status
• Reviewed by different External
Consultants−ELTAP (ILS.Inc., 2007)−Infosys Ethiopia plc. (Microsoft licensed
company) concludes• user friendly, (local language and calendar) • efficient, • reliable,
15
Technical status…
• Development
Environment−Server side
• Microsoft SQL Server 2003 Enterprise edition
−Client side• Microsoft Visual studio.NET
2003• Power Geez 2003/05• Microsoft Office• Acrobat Reader
16
Technical status…
• Production environment−Server side
• Microsoft SQL Server 2005 Express edition
• Freeware• 4GB Capacity
−Client side• Microsoft.Net Framework• Power Geez 2003/05• Microsoft Office• Acrobat Reader
17
Technical status…
• Documentation−Proper system development
documentation• ISLA Database definition• ISLA users’ Guide• ISLA Administrators’ Guide• ISLA knowledge base• ISLA security Manual• Each ISLA version report
18
Legal matters
• EPLAUA has full ownership (copy
right)• Source code• Software Installation
• Each Woreda will receive Official
declaration from EPLAUA to use ISLA
Info. as official source of the registry
19
Lesson learned
• System Development requires longer time
• It Dependably dynamic on system user needs & driven by EPLAUA staff
• Close follow up & support… a key success factor
• Data … the most valuable asset and irreplaceable
• Require continuous & reliable Capacity building
• Implementing gradually as the support capacity improves
• This system introduction experience has shown that you have to pilot, gain experience and build capacity before scaling up
20
Challenges
• Virus threat• Frequent fluctuation of power/cut • Work volume of data entry for the first time demands more
skilled labour• No IT infrastructure facilities in the centre
− Server− Network− Internet− Computer laboratory, etc
21