Publications

The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.

Titlesort descending Summary Subject Category Date Published
Criminal Justice Information Services (CJIS) Security Policy (v5.0)

The CJIS Security Policy provides Criminal Justice Agencies (CJA) and Noncriminal Justice Agencies (NCJA) with a minimum set of security requirements for the access to Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) Division systems and information and to protect and safeguard Criminal Justice Information (CJI).

Criminal Justice Information Security Data Management February 2011
Criminal Justice Information Services (CJIS) Security Policy (v5.1)

The CJIS Security Policy provides Criminal Justice Agencies (CJA) and Noncriminal Justice Agencies (NCJA) with a minimum set of security requirements for the access to Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) Division systems and information and to protect and safeguard Criminal Justice Information (CJI).

Criminal Justice Information Security Data Management July 2012
Criminal Justice Information Services (CJIS) Security Policy (v5.3)

The CJIS Security Policy provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI. This Policy applies to every individual-contractor, private entity, noncriminal justice agency representative, or member of a criminal justice entity-with access to, or who operate in support of, criminal justice services and information.

Data Security Security August 2014
Criminal Justice Information Services (CJIS) Security Policy (v5.4)

The essential premise of the CJIS Security Policy is to provide appropriate controls to protect the full lifecycle of CJI, whether at rest or in transit. The CJIS Security Policy provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI. This Policy applies to every individual—contractor, private entity, noncriminal justice agency representative, or member of a criminal justice entity—with access to, or who operate in support of, criminal justice services and information.

Data Security Security October 2015
Criminal Justice Information Services (CJIS) Security Policy (v5.6)

Law enforcement needs timely and secure access to services that provide data wherever andwhenever for stopping and reducing crime. In response to these needs, the Advisory Policy Board(APB) recommended to the Federal Bureau of Investigation (FBI) that the Criminal JusticeInformation Services (CJIS) Division authorize the expansion of the existing security managementstructure in 1998.Administered through a shared management philosophy, the CJIS SecurityPolicy contains information security requirements, guidelines, and agreements reflecting the willof law enforcement and criminal justice agencies for protecting the sources, transmission, storage,and generation of Criminal Justice Information (CJI).The Federal Information SecurityManagement Act of 2002 provides further legal basis for the APB approved management,operational, and technical security requirements mandated to protect CJI and by extension thehardware, software and infrastructure required to enable the services provided by the criminaljustice community.

Data Security Security June 2017
Department of Homeland Security Computer-Aided Dispatch Interoperability Project

CADIP addresses an issue that today’s emergency response agencies may face: CAD systems that are not linked across jurisdictions and, as a result, have difficultly responding to multi‐jurisdictional emergencies.

Interoperability and Information Sharing Data Management July 2008
Deploying Intelligent Storage for Video Surveillance and Physical Security

The video surveillance industry is undergoing a significant transformation—it is much more than simply observing crimes. Challenges created by more cameras, higher resolutions, and increasingly complex analytics are creating an influx in data, and managing this infrastructure takes an intelligent, scalable storage platform. Quantum’s video surveillance data storage solution has the ability to tier storage, which will save you money without reducing video quality, retention time, or camera streams—allowing you to invest more in other tools needed to successfully keep people and property safe.

Security, Data Storage Data Management, Security February 2016
Desperately Seeking Security Frameworks - A Roadmap for State CIOs

This report provides an overview of the primary security standards, regulations, and laws that impact state IT security programs, highlights how states have used the frameworks to shape their security architectures, policies, standards, and controls, and identifies the key issues for CIOs as they establish and maintain IT security programs.

IT Security Data Management February 2009
DHS Cybersecurity Strategy

This strategy provides the Department with a framework to execute our cybersecurity responsibilities during the next five years to keep pace with the evolving cyber risk landscape by reducing vulnerabilities and building resilience; countering malicious actors in cyberspace; responding to incidents; and making the cyber ecosystem more secure and resilient.

Cybersecurity Security May 2018
DHS S&T Cyber Security Division 2018 Portfolio Guide

The DHS Science & Technology, Cyber Security Division, 2018 Portfolio Guide presents in-depth summaries of S&T’s various cybersecurity R&D program areas—from Cyber for Critical Infrastructure to Cyber Physical System Security. In all, the guide delivers 15 insightful overviews—including one about the DHS Silicon Valley Innovation Program—encompassing the totality of S&T’s broad cybersecurity research portfolio.

Cyber Security Security March 2018

Pages