1 / 11

CJIS SECURITY POLICY 28 CFR

Learn about the 28 CFR which governs the security policy of CJIS, ensuring accuracy, completeness, currency, integrity, and privacy protection of criminal history records. Find out about the measures in place to prevent unauthorized access and maintain the security of state and local criminal history record information systems.

bowmanj
Download Presentation

CJIS SECURITY POLICY 28 CFR

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CJIS SECURITY POLICY28 CFR

  2. What is 28 CFR? Federal regulation the security policy of Criminal Justice Information Systems (CJIS) falls under. Official name: Title 28 United States Code (USC), Section 534 & Title 28 Code of Federal Regulations (CFR)

  3. Purpose of 28 CFR • Accuracy • Completeness • Currency • Integrity • Integrity • Security • Protection of individuals privacy To assure criminal history records wherever they appear are collected, stored, and disseminated in a manner to ensure:

  4. Security of State and Local Criminal History Record Information Systems • Computerized data: • Effective and Technologically advanced software and hardware designs are instituted to prevent unauthorized access. • Access to criminal history records (Hard copies, data discs): • Whether in use or stored, is restricted to authorized law enforcement personnel. • Computers and all related devices (hard drives, servers, etc.) are stored in an area that is secure and not accessible by the general public.

  5. Security of State and Local Criminal History Record Information Systems Criminal history record information is stored by the computer in such a manner that it cannot be modified. Operation programs prohibit inquiry, record updates, or record destruction. DPS LERB is the only criminal justice division that has designated terminals that can modify or correct criminal histories.

  6. Proper Disposal of Information • Hard copies, CD’s, Hard Drives, Disks must be disposed of properly. Proper methods inlcude: • Shredding • Burning • Any method of permanent destruction (Note: If contracted out, any contracted employee must be fingerprinted and background check completed.)

  7. Do this, Don’t do that Do: • Run valid inquiries on individuals pertaining to current cases, traffic stops, etc. • Always include a valid reason (Case #, etc.) Don’t: • Run a query for private use, which includes: • Yourself • Family • Friends • Spouses • Exes • Co-Workers • Government officials

  8. Misuse may result in: Written warning Administrative leave Termination Criminal charges (federally and/or locally)

  9. Privacy Confidentiality is key An Individual’s criminal history can only be released to the public with their permission.

  10. Always Watching Searching CJIS leaves an electronic “paper trail” The FBI can view what you are running

  11. Drew JohnsonTriple I Program Managerdrew.johnson@state.nm.us505-827-3317

More Related