SlideShare a Scribd company logo
1 of 3
Download to read offline
Understanding CJIS Compliance – Security
Awareness Training
In the previous blog on information exchange agreements, we explored various user cases in
which agencies need to sign agreements regarding Criminal Justice Information (CJI) exchange.
In this blog, we will focus on the security awareness training required for personnel who access
CJI. It is to be understood that the basic security awareness training is to be given to all the
people who are accessing CJI data. This training is to be given within six months of initial
assessment and also need to be trained once in every two years. A Special Intelligence Bureau
(SIB) chief or a CJIS Systems Officer (SIB/CSO) would need to accept the documentation
related to the completion of security training from another agency. Accepting the documentation
from another agency means that the accepting agency assumes the risk that the training may not
meet all the requirements needed by the federal, local or state laws.
Awareness Topics
There can be several topics that are mentioned in an awareness campaign or session. In order to
facilitate implementation and development of individual agency security awareness programs the
guidelines below will be useful
All Personnel
As a minimum requirement the guidelines mentioned below need to be addressed as a basic
security awareness program for all authorized personnel who have access to Criminal Justice
Information.
1. General rules, responsibilities and required behavior with respect to usage of CJI
2. Who to contact in case of an incident and the necessary actions needed to be taken
3. Protection of media
4. Implications of non-compliance to rules and regulations
5. Protection of information subject to confidentiality
6. Physical access to spaces and visitor control. It also mentions the applicable security
policies in place and reporting that is required to be made in case of unauthorized access
7. Social engineering
8. Risks, threats and vulnerabilities associated in the process of handling CJI
9. Proper marking and handling of CJI
10. Matters relating to dissemination and destruction of information
Personnel with logical and physical access
In addition to the above basic guidelines, people with physical and logical access need to
understand and follow the below mentioned guidelines
1. General rules that outline the responsibilities and behavior related to usage of information
systems
2. Creation, usage and management of passwords
3. Web Usage - monitoring of user activity and prohibited sites
4. Spam
5. Specifics related to unknown attachments/emails
6. Physical security- risks related to systems and data
7. Protection that needs to be made with respect to Trojans, virus, malicious codes and
malware
8. Use of encryption techniques for transferring sensitive information over the Internet
9. Issues related to access control
10. Both information related and physical security with respect to laptops and their usage
11. Issues associated with handheld devices and desktops as well
12. Individual accountability including an explanation of what it means to the agency
13. Specifics about if personally owned equipment is allowed by the agency or the state
14. Specifics related to information security and confidential items, their usage, backup,
archiving or destruction after its need is over.
Personnel with Information Technology Roles
Additionally, for people associated with information technology roles, there are a few other
guidelines that need to be followed and are as mentioned below
1. Measures taken to protection of network infrastructure
2. Access control measures
3. Backup and storage of data and if the approach is centralized or decentralized
4. Protection of the system and information from Trojans, worms, and viruses including
scanning and updating of virus definitions
5. As part of the configuration management, application and system patches need to be
applied
Security Training Records
A record of the individual security awareness training and also specific information system
security training would be documented. These documents need to be maintained by
SIB/CSO/Compact Officer. The maintenance of training records can also be delegated to local
bodies as well.
In the next blog, we will discuss the next policy area which is Incident Response.
DoubleHorn is a leading Cloud Solutions Provider founded in January 2005 and based in Austin,
Texas. Our solutions combine products from the leading Cloud providers and are carefully
crafted to meet your requirements. As a trusted advisor, we help you choose the right solution,
implement it and help you maintain with our decade old expertise as a Cloud Services provider.
If you are new to the cloud and not sure how to get started, contact us for a complimentary initial
assessment at solutions@doublehorn.com or (855) 618-6423.

More Related Content

Recently uploaded

VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
 
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
 
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCC
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learning
 
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
 
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
 
SMART BANGLADESH I PPTX I SLIDE IShovan Prita Paul.pptx
SMART BANGLADESH  I    PPTX   I    SLIDE   IShovan Prita Paul.pptxSMART BANGLADESH  I    PPTX   I    SLIDE   IShovan Prita Paul.pptx
SMART BANGLADESH I PPTX I SLIDE IShovan Prita Paul.pptx
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptx
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Understanding CJIS Compliance – Security Awareness Training

  • 1. Understanding CJIS Compliance – Security Awareness Training In the previous blog on information exchange agreements, we explored various user cases in which agencies need to sign agreements regarding Criminal Justice Information (CJI) exchange. In this blog, we will focus on the security awareness training required for personnel who access CJI. It is to be understood that the basic security awareness training is to be given to all the people who are accessing CJI data. This training is to be given within six months of initial assessment and also need to be trained once in every two years. A Special Intelligence Bureau (SIB) chief or a CJIS Systems Officer (SIB/CSO) would need to accept the documentation related to the completion of security training from another agency. Accepting the documentation
  • 2. from another agency means that the accepting agency assumes the risk that the training may not meet all the requirements needed by the federal, local or state laws. Awareness Topics There can be several topics that are mentioned in an awareness campaign or session. In order to facilitate implementation and development of individual agency security awareness programs the guidelines below will be useful All Personnel As a minimum requirement the guidelines mentioned below need to be addressed as a basic security awareness program for all authorized personnel who have access to Criminal Justice Information. 1. General rules, responsibilities and required behavior with respect to usage of CJI 2. Who to contact in case of an incident and the necessary actions needed to be taken 3. Protection of media 4. Implications of non-compliance to rules and regulations 5. Protection of information subject to confidentiality 6. Physical access to spaces and visitor control. It also mentions the applicable security policies in place and reporting that is required to be made in case of unauthorized access 7. Social engineering 8. Risks, threats and vulnerabilities associated in the process of handling CJI 9. Proper marking and handling of CJI 10. Matters relating to dissemination and destruction of information Personnel with logical and physical access In addition to the above basic guidelines, people with physical and logical access need to understand and follow the below mentioned guidelines 1. General rules that outline the responsibilities and behavior related to usage of information systems 2. Creation, usage and management of passwords 3. Web Usage - monitoring of user activity and prohibited sites 4. Spam 5. Specifics related to unknown attachments/emails 6. Physical security- risks related to systems and data 7. Protection that needs to be made with respect to Trojans, virus, malicious codes and malware 8. Use of encryption techniques for transferring sensitive information over the Internet 9. Issues related to access control
  • 3. 10. Both information related and physical security with respect to laptops and their usage 11. Issues associated with handheld devices and desktops as well 12. Individual accountability including an explanation of what it means to the agency 13. Specifics about if personally owned equipment is allowed by the agency or the state 14. Specifics related to information security and confidential items, their usage, backup, archiving or destruction after its need is over. Personnel with Information Technology Roles Additionally, for people associated with information technology roles, there are a few other guidelines that need to be followed and are as mentioned below 1. Measures taken to protection of network infrastructure 2. Access control measures 3. Backup and storage of data and if the approach is centralized or decentralized 4. Protection of the system and information from Trojans, worms, and viruses including scanning and updating of virus definitions 5. As part of the configuration management, application and system patches need to be applied Security Training Records A record of the individual security awareness training and also specific information system security training would be documented. These documents need to be maintained by SIB/CSO/Compact Officer. The maintenance of training records can also be delegated to local bodies as well. In the next blog, we will discuss the next policy area which is Incident Response. DoubleHorn is a leading Cloud Solutions Provider founded in January 2005 and based in Austin, Texas. Our solutions combine products from the leading Cloud providers and are carefully crafted to meet your requirements. As a trusted advisor, we help you choose the right solution, implement it and help you maintain with our decade old expertise as a Cloud Services provider. If you are new to the cloud and not sure how to get started, contact us for a complimentary initial assessment at solutions@doublehorn.com or (855) 618-6423.