The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.

Title Summary Subject Category Date Publishedsort ascending
Digital First Engagement Management For Government and Public Sector

Government and public sector organizations continue to face unprecedented challenges as a result of the converging demands of the digital customer and the long-running global economic uncertainty.

In the past decade, government and public sector organizations took the first steps to exploiting the web as a way of “channel shifting” some of their popular services. Today, while organizations see digital channels as an important part of their digital customer engagement strategies, many are not fully realizing their expected benefits.

Data Sharing Data Management December 2015
Realizing the Value of Contextual Knowledge Within Government and Public Sector Customer Service

Government and public sector organizations are facing unprecedented challenges as a result of the converging pressures of the increasing expectations of the digital customer and heavily scrutinized budgets. These two challenges have led many public sector organizations to provide digital access to services as a way of not only giving their customers what they want, but also reducing their own cost of service delivery.
To address this growth, many organizations are increasingly investing in technology to help them achieve budget compliance while meeting the increasing expectations of customer service quality.
A challenge to achieving these goals is the management of information that rarely changes, such as a statute on how to register a boat trailer, and frequently changing information, such as a listing of available health and human services.

Data Sharing Data Management December 2015
Global Data Breach Notification Laws: Meeting Requirements and Mitigating Risks with Endpoint Security

A common nightmare scenario for security leaders today is having a laptop, tablet, or smartphone – loaded with sensitive information – go missing. When devices are lost or stolen and
personal data is breached, organizations face increasing obligations to disclose incidents to the affected individuals and/or government agencies. Disclosure requirements partly explain
why, according to recent research, 72% of business and security professionals say their top mobile security concern is data loss due to lost or stolen devices.

Rooted in privacy law, data breach notification requirements are based on the philosophy that notification can mitigate the risks for individuals who are affected by breaches. With notification, individuals or government agencies may be able to take actions to protect those affected and avert for example, identity theft, financial loss, or injury to personal character. Another major driver behind these rules is to compel organizations to prevent breaches by implementing security controls that adequately protect information.

Data Security Data Management, Security December 2015
Emergency Services Mutual Aid – Can Technology Help?

While large cities typically have enough emergency service resources to handle incidents within their borders, the same cannot always be said for smaller towns. Often, these communities prepare for disasters by establishing mutual aid agreements among themselves. These deals ensure that if one town is overwhelmed by an emergency, nearby towns will come to their aid.

However, while these agreements are well-intentioned, maintaining them can sometimes be a challenge for towns that are limited in emergency personnel and equipment.

Data Sharing, Data Interoperability Data Management December 2015
CJIS Compliance on AWS

There is a long and successful track record of AWS customers using the AWS cloud for a wide range of sensitive federal and state government workloads, including Criminal Justice Information (CJI) data. Law enforcement customers (and partners who manage CJI) are taking advantage of AWS services to dramatically improve the security and protection of CJI data, using the advanced security services and features of AWS such as activity logging (AWS CloudTrail), encryption of data in motion and at rest (Amazon S3’s Server-Side Encryption with the option to bring your own key), comprehensive key management and protection (AWS Key Management Service and AWS CloudHSM), along with integrated permission management (IAM federated identity management, multi-factor authentication).
To enable this, AWS complies with Criminal Justice Information Services Division (CJIS) Security Policy requirements where applicable, such as regularly performing background checks on our employees and signing CJIS security addendum agreements with our customers.

Data Security Data Management November 2015
Simplifying CJIS Compliance with AWS

Law enforcement is taking advantage of Amazon Web Services (AWS) to improve the security and protection of Criminal Justice Information (CJI) data. AWS offers security automation, tools, and visibility to move faster and comply with Criminal Justice Information Services (CJIS) security requirements so your agency can stay safe, by design. Learn how to ensure CJIS compliance with AWS and take the simple route to security.

Data Security Data Management November 2015
How Interoperability Helps Reduce Costs and Optimize Efficiency

Decades ago, when public safety agencies were first beginning to invest in in-house IT systems, many agencies purchased technology from various vendors that ended up being incompatible with the technology of other agencies, including those in the same geographic localities. The information contained in an RMS system in one jurisdiction was not compatible with the information contained in another, and was functionally useless to any parties other than the primary owner of that system.

This situation ended up creating information siloes amongst agencies with aligned goals: a fire and police department in the same municipality, a county sheriff’s office and a local police force, or EMS forces from adjacent jurisdictions could not share information being collected on these platforms.

Data Interoperability Data Management November 2015
5 Trends Transforming Public Safety Communications

Public safety communications are transforming. The 2015 research revealed five key trends that impact agencies of all sizes. These indicators signal fundamental changes in the way agencies interact with their communities, interoperate with each other, access real-time information, migrate to more collaborative multi-networks and devices, and manage data and evolving technologies.

Communications Communications November 2015
ELECTRONIC HEALTH RECORDS: Nonfederal Efforts to Help Achieve Health Information Interoperability

Representatives from the 18 nonfederal initiatives GAO reviewed described a variety of efforts they are undertaking to achieve or facilitate electronic health record (EHR) interoperability, but most of these initiatives remain works in progress. EHR interoperability is the ability of systems to exchange electronic health information with other systems and process the information without special effort by the user, such as a health care provider. These initiatives' efforts include creating guidance related to health data standards, encouraging the adoption of certain health data standards or policies that facilitate interoperability, and operating networks that connect EHR systems to enable interoperability. The initiatives varied in a number of other ways, including the types of electronic systems the initiatives are working to make interoperable, the cost of their products or services, the geographic area served, patient use of the products or services, and their organizational structures. 

Data Sharing, Interoperability Data Management November 2015
State CIO Priorities for 2016

Top 10 Final Rankings for Priority Strategies, Management Processes and Solutions and Priority Technologies, Applications and Tools.

Technology Priorities Data Management, Communications, Mobile/Portable Computing, Technology Equipment November 2015