The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|Justice Assistance Grant (JAG) Program, 2015||
The Department of Justice's Bureau of Justice Statistics (BJS) has released Justice Assistance Grant (JAG) Program, 2015, which describes steps used in the Edward Byrne Memorial Justice Assistance Grant (JAG) formula calculation process to determine award amounts for states, local governments, and territories. It presents summary results of the FY 2014 allocation amounts.
|Grant Funding||Uncategorized||October 2015|
|Content Encryption: Key Issues to Consider||
Encryption of electronic content is an essential best practice, despite the fact that many organizations and individual users do not encrypt email, files stored behind their corporate firewall, files stored in the cloud, and in other venues. However, most IT administrators understand the benefits of encrypting content to protect sensitive or confidential information, to protect their organizations against data breaches, to satisfy regulatory obligations, and to protect against various types of legal liabilities.
It is important for decision makers to understand that encryption is more than simply a defensive strategy to protect against data breaches or to comply with regulations. Organizations that encrypt content can create new business opportunities and create competitive differentiation that can contribute significantly to their bottom line and provide new ways of attracting and keeping customers.
|Data Security||Data Management||October 2015|
|Criminal Justice Information Services (CJIS) Security Policy (v5.4)||
The essential premise of the CJIS Security Policy is to provide appropriate controls to protect the full lifecycle of CJI, whether at rest or in transit. The CJIS Security Policy provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI. This Policy applies to every individual—contractor, private entity, noncriminal justice agency representative, or member of a criminal justice entity—with access to, or who operate in support of, criminal justice services and information.
|Data Security||Security||October 2015|
|NIST Big Data Interoperability Framework: Volume 1, Definitions||
There is broad agreement among commercial, academic, and government leaders about the remarkable potential of Big Data to spark innovation, fuel commerce, and drive progress. Big Data is the common term used to describe the deluge of data in today’s networked, digitized, sensor-laden, and information driven world. The availability of vast data resources carries the potential to answer questions previously out of reach, including the following:
|Data Security||Data Management, Security||September 2015|
|State agencies digitize processes and share information in real time||
Georgia Technology Authority (GTA)’s mission is to introduce new technology to state agencies to improve business processes and expand data-sharing opportunities. In the past, agencies were limited by point-to-point, hard-coded integrations, siloed systems and manual processes that were paper-based and slow.
GTA meets its objectives by using Software AG technology as a key component for the State IT Roadmap and is prepared for the challenges of the digital world. webMethods is the standard platform for application integration so agencies can share information securely in real-time. ARIS and webMethods are used
|Data Sharing||Data Management||September 2015|
|Broadband Opportunity Council Report and Recommendations||
The United States continues to experience unprecedented growth and innovation in broadband and in the advanced applications and services it enables. While the benefits of increased broadband access and adoption are widespread, barriers like income and geography keep many Americans from taking advantage of the economic, educational and social benefits of broadband access. To make sure that the Federal government does everything within its power to support broadband deployment and adoption, on March 23, 2015, President Obama signed a Presidential Memorandum (Memorandum) “Expanding Broadband Deployment and Adoption by Addressing Regulatory Barriers and Encouraging Investment and Training.”1 The Memorandum created the Broadband Opportunity Council (Council) and tasked it to produce specific recommendations to increase broadband deployment, competition and adoption through executive actions within the scope of existing Agency programs, missions and budgets.
|Data Interoperability, Broadband||Data Management, Communications, Mobile/Portable Computing||September 2015|
|Health IT Standards for Health Information Management Practices||
The IHE Information Technology Infrastructure (ITI) White Paper “HIT Standards for HIM Practices,” describes the need for, value and an approach for aligning HIM business practices (HIM practices) with capabilities of standards-based HIT products to support information governance in healthcare.
|Health Info Management||Data Management||September 2015|
|An IBM Academy of Technology Perspective about FirstNet, a Public Safety Network||
After the events of September 2001 in the United States, first responders rallied the United States government to dedicate a portion of the 700 MHz radio frequency in North America to emergency first responders. The 9/11 Commission recommended the establishment of a nationwide, interoperable public safety communications network to resolve the communication challenges that are faced by first responders nationwide. In the United States, this network is called FirstNet.
|Interoperable Communications||Communications||September 2015|
|Mobile Apps for Public Safety Organizations: Survey of Common Features||
The use of mobile devices has grown significantly in the last few years. In a recent Pew Research report, 46% of respondents said they could not live without their smartphone; earlier research had 44% of respondents reporting that they sleep with their phones.
Google has extensively studied mobile search and app use and has coined a new term: “micro-moments.” These micro-moments are defined as “the I want-to-know moments, I want-to-go moments, I want-to-do moments, and I want-to-act moments” that drive behavior.
Sponsored by MicroAssist
|Mobile Applications, Information Sharing||Data Management, Mobile/Portable Computing||September 2015|
|State of California Sets a New Standard for IT with Shared Services||
California is the world’s eighth-largest economy, and our IT challenges exceed those of many national governments. That was particularly true during the budget crisis that began in 2008. In the face of severe budget cutbacks, state agencies needed to radically change the way they operated to keep meeting their missions to serve citizens.
The State CIO, Carlos Ramos, developed a vision to improve IT efficiency by adopting shared services. Instead of each department purchasing and managing its own IT infrastructure, all departments in an agency would share a common IT infrastructure. The idea was to slash IT capital and operational expense—and increase service levels at the same time.
|Data Security||Data Management||September 2015|