The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|Criminal Justice Information Services (CJIS) Security Policy (v5.3)||
The CJIS Security Policy provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI. This Policy applies to every individual-contractor, private entity, noncriminal justice agency representative, or member of a criminal justice entity-with access to, or who operate in support of, criminal justice services and information.
|Data Security||Security||August 2014|
|2012 Census of Governments - Individual State Descriptions||
A census of governments is taken at 5-year intervals as required by law under Title 13, U.S. Code, Section 161. This 2012 Census covers three major subject fields—government organization, public employment, and government finances.The “Individual State Descriptions” provides information about the organization of state and local governments. There is a separate summary for each state and the District of Columbia. The summaries are divided according to the five basic types of local governments recognized for the U.S. Census Bureau’s classification of government units— county, municipal, township, school district, and special district governments.
|Government organization, employment, and finances||Uncategorized||September 2013|
|Mitigating Risks in the Application of Cloud Computing in Law Enforcement||
Mitigating Risks in the Application of Cloud Computing in Law Enforcement, by Paul Wormeli, Executive Director Emeritus, IJIS Institute, explores concerns the law enforcement community has regarding Cloud Computing, its reliability and availability, performance requirements, cost of migration, and the recovery of data. The report concludes with six recommendations on how law enforcement organizations can successfully implement a move to cloud computing.
|Cloud Computing||Data Management, Security||October 2012|
|Steps to Prepare for Public Safety Broadband||
The National Governors Association hosted a forum, "Preparing for Public Safety Broadband," to help states with the implementation of the nationwide broadband network dedicated to public safety communications. During the forum NGA released Steps to Prepare for Public Safety Broadband and an accompanying white paper, which outlines the essential steps states can take now to prepare for implementation.
|Public Safety Broadband||Communications||July 2012|
|Health Care: Next Steps After the Supreme Court Decision||
The National Governors Association held a meeting for states entitled Health Care: Next Steps after the Supreme Court Decision, which offered governors' health policy advisors, Medicaid directors, insurance commissioners and exchange leads an opportunity to confer with each other, federal officials and health system experts about next steps relative to their state's health care system. Here is a summary of the meeting and an appendix of questions from states compiled during the meeting.
|Health Care System||Data Management||July 2012|
|Criminal Justice Information Services (CJIS) Security Policy (v5.1)||
The CJIS Security Policy provides Criminal Justice Agencies (CJA) and Noncriminal Justice Agencies (NCJA) with a minimum set of security requirements for the access to Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) Division systems and information and to protect and safeguard Criminal Justice Information (CJI).
|Criminal Justice Information Security||Data Management||July 2012|
|Leveraging Enterprise Architecture for Improved IT Procurement||
This NASCIO brief presents an overview of how the discipline of Enterprise Architecture (EA) can be used to improve and lower costs of state IT procurement. The degree of EA maturity in states can vary as much as the very rules that govern IT procurement, but a closer look will provide guidance on alignment of these vital functions of government.
|IT Procurement||Uncategorized||June 2012|
|APCO White Paper: High Priority Information Sharing Needs for Emergency Communications and First Responders||
This paper identifies high priority information sharing capabilities currently needed for the emergency communications and first responder communities. As a listing of information sharing needs with a simple description and suggested deliverables for each, it is not intended to provide a detailed analysis, exploration, or case scenario of each issue.
|Information Sharing||Data Management, Communications||June 2012|
|Maternal and Child Health (MCH) Update: The Beginnings of the Affordable Care Act (ACA) Implementation—Moving Towards Improving Health Outcomes||
Medicaid and the State Children's Health Insurance Program (SCHIP) provide a critical source of health insurance coverage to low-income pregnant women, infants, and children. These reports highlight state trends in health care coverage for women and children through Medicaid and SCHIP.
|Maternal and Child Health||Data Management||May 2012|
|2011 National Network of Fusion Centers - Final Report||
The 2011 National Network of Fusion Centers Final Report (Final Report) describes the overall capabilities of the National Network based on the 2011 Fusion Center Assessment (2011 Assessment) data. This report includes (1) a detailed analysis of the collective capability of fusion centers, (2) an analysis of the effectiveness of federal support to fusion centers, and (3) recommendations for Federal Government action to support the National Network in further building its capabilities.
|Fusion Centers||Data Management||April 2012|