https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy/5.9/CJIS Security Policy5.9Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.9.2021-04-15T00:00:00.000ZtrueThis artifact is published by the Georgia Tech Research Institute (GTRI) as part of the Trustmark Initiative. This artifact and the information contained herein is provided on an "AS IS" basis, and GTRI disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, GTRI disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.https://trustmarkinitiative.org/Trustmark InitiativePRIMARYTrustmark Supporthelp@trustmarkinitiative.org555-555-5555https://trustmarkinitiative.org/https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy/5.4/SecurityInformation AssuranceCJIS Security Policyhttps://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-1.3_-relationship-to-local-security-policy-and-other-policies/5.4/1CJIS Security Policy Section 1.3, Relationship to Local Security Policy and Other Policies5.4Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.4, Section 1.3.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-3.2_-roles-and-responsibilities-for-agencies-and-parties/5.8/2CJIS Security Policy Section 3.2, Roles and Responsibilities for Agencies and Parties5.8Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.8, Section 3.2.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-4.2_-access_-use-and-dissemination-of-criminal-history-record-information-_chri__-ncic-restricted-files-information_-and-ncic-non-restricted-files-information/5.4/3CJIS Security Policy Section 4.2, Access, Use and Dissemination of Criminal History Record Information (CHRI), NCIC Restricted Files Information, and NCIC Non-Restricted Files Information5.4Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.4, Section 4.2.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-4.3_-personally-identifiable-information-_pii_/5.4/4CJIS Security Policy Section 4.3, Personally Identifiable Information (PII)5.4Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.4, Section 4.3.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-5.1_-policy-area-1_-information-exchange-agreements/5.4/5CJIS Security Policy Section 5.1, Policy Area 1: Information Exchange Agreements5.4Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.4, Section 5.1.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-5.2_-policy-area-2_-security-awareness-training/5.8/6CJIS Security Policy Section 5.2, Policy Area 2: Security Awareness Training5.8Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.8, Section 5.2.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-5.3_-policy-area-3_-incident-response/5.5/7CJIS Security Policy Section 5.3, Policy Area 3: Incident Response5.5Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.5, Section 5.3.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-5.4_-policy-area-4_-auditing-and-accountability/5.4/8CJIS Security Policy Section 5.4, Policy Area 4: Auditing and Accountability5.4Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.4, Section 5.4.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-5.5_-policy-area-5_-access-control/5.4/9CJIS Security Policy Section 5.5, Policy Area 5: Access Control5.4Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.4, Section 5.5.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-5.6_-policy-area-6_-identification-and-authentication/5.8/10CJIS Security Policy Section 5.6, Policy Area 6: Identification and Authentication5.8Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.8, Section 5.6.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-5.7_-policy-area-7_-configuration-management/5.4/11CJIS Security Policy Section 5.7, Policy Area 7: Configuration Management5.4Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.4, Section 5.7.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-5.8_-policy-area-8_-media-protection/5.4/12CJIS Security Policy Section 5.8, Policy Area 8: Media Protection5.4Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.4, Section 5.8.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-5.9_-policy-area-9_-physical-protection/5.4/13CJIS Security Policy Section 5.9, Policy Area 9: Physical Protection5.4Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.4, Section 5.9.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-5.10_-policy-area-10_-system-and-communications-protection-and-information-integrity/5.7/14CJIS Security Policy Section 5.10, Policy Area 10: System and Communications Protection and Information Integrity5.7Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.7, Section 5.10.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-5.11_-policy-area-11_-formal-audits/5.4/15CJIS Security Policy Section 5.11, Policy Area 11: Formal Audits5.4Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.4, Section 5.11.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-5.12_-policy-area-12_-personnel-security/5.7/16CJIS Security Policy Section 5.12, Policy Area 12: Personnel Security5.7Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.7, Section 5.12.https://artifacts.trustmarkinitiative.org/lib/tips/cjis-security-policy-section-5.13_-policy-area-13_-mobile-devices/5.8/17CJIS Security Policy Section 5.13, Policy Area 13: Mobile Devices5.8Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.8, Section 5.13.CJIS-SP-V5.9Criminal Justice Information Services (CJIS) Security Policy Version 5.9, 06/01/2020, CJISD-ITS-DOC-08140-5.9Access to Criminal Justice InformationAccreditationAdministration of Criminal JusticeAdvanced AuthenticationAAAgency Controlled Mobile DeviceAgency CoordinatorACAgency Issued Mobile DeviceAgency LiaisonALAsymmetric EncryptionAuthorized RecipientAuthorized User/PersonnelAuthorizing OfficialAvailabilityBiographic DataBiometric DataCase / Incident HistoryCertificate Authority (CA) CertificateCertificationChannelerCJIS Advisory Policy BoardAPBCJIS Audit UnitCAUCJIS Security PolicyCJIS Systems AgencyCSACJIS Systems Agency Information Security OfficerCSA ISOCJIS Systems OfficerCSOCloud ClientCloud ComputingCloud ProviderCloud SubscriberCompact CouncilCompact OfficersCompensating ControlsComputer Security Incident Response CapabilityCSIRCConfidentialityContracting Government AgencyCGAContractorCrime Reports DataCriminal History Record InformationCHRICriminal Justice AgencyCJACriminal Justice Agency User AgreementCriminal Justice ConveyanceCriminal Justice Information (CJI)Criminal Justice Information Services DivisionFBI CJISCJISDataDegaussDepartment of JusticeDoJDigital MediaDigital SignatureDirect AccessDisseminationEnvironmentEscortFacsimileFaxFBI CJIS Information Security Officer (FBI CJIS ISO)Federal Bureau of InvestigationFBIFederal Information Security Management ActFISMAFor Official Use OnlyFOUOFull-feature Operating SystemGuest Operating SystemHit ConfirmationHost Operating SystemHybrid EncryptionHypervisorIdentity History DataIn-BandIncidentIndirect AccessInformationInformation Exchange AgreementInformation SecurityInformation Security OfficerISOInformation SystemInformation TechnologyInformationTypesIntegrated Automated Fingerprint Identification SystemIAFISIntegrityInterconnection Security AgreementISAInterface AgencyInternet ProtocolIPInterstate Identification IndexIIIJailbreak (Jailbroken)Laptop DevicesLaw Enforcement Enterprise PortalLEEPLimited-feature Operating SystemLocal Agency Security OfficerLASOLogical AccessLogical PartitioningManagement Control AgreementMCAManagement ControlsMediaMobile (WiFi) HotspotMobile DeviceMobile Device ManagementMDMNational Crime Information CenterNCICNational Instant Criminal Background Check SystemNICSNational Institute of Standards and TechnologyNISTNCJA (Government)NCJA (Private)NCJA (Public)Noncriminal Justice AgencyNCJANoncriminal Justice PurposeOffice of Management and BudgetOMBOne Time PasswordOTPOrganizationOut-of-BandOutsourcingOutsourcing StandardPartitioningPersonal FirewallPersonally Identifiable InformationPIIPhysical AccessPhysical MediaPhysical PartitioningPhysically Secure LocationPocket/Handheld Mobile DevicePortable DevicePotential ImpactProperty DataRap BackReceive-Only TerminalROTRecordsRepository Manager, or Chief AdministratorRiskRisk ManagementRoot (Rooting, Rooted)SafeguardsSanitizationSecondary DisseminationSecurity AddendumSASecurity CategorySecurity ControlsSecurity PlanSecurity RequirementsSensitive But UnclassifiedSBUServer/Client Computer Certificate (device-based)ServiceShredderSmartphoneSocial EngineeringSoftware PatchSpamState and Federal Agency User AgreementState Compact OfficerState Identification BureauSIBState Identification Bureau ChiefSIB ChiefState of ResidencySymmetric EncryptionSystemSystem Security PlanTablet DevicesTerminal Agency CoordinatorTACThreatUserUser Certificate (user-based)Virtual EscortVirtual MachineVMVirtualizationVoice over Internet ProtocolVoIPVulnerabilityWireless (WiFi) HotspotWireless Access Point