{
"ConformanceCriteria": [{
"Description": "The CSO shall set, maintain, and enforce the following:
\n1. Standards for the selection, supervision, and separation of personnel who have access to CJI.",
"Number": 1,
"Citations": [{
"Description": "Section 3.2.2(1).<\/em>",
"Source": {"$ref": "#source-1122302982"}
}],
"$id": "criterion1",
"Name": "C1"
}],
"AssessmentSteps": [{
"ConformanceCriteria": [{"$ref": "#criterion1"}],
"Artifacts": [{
"Description": "Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.",
"Name": "A1"
}],
"Description": "Has the organization's CSO set, maintained, and enforced standards for the selection, supervision, and separation of personnel who have access to CJI?",
"Number": 1,
"$id": "CJISCSOSetsStandards",
"Name": "CJIS CSO Sets Standards"
}],
"$TMF_VERSION": "1.4",
"AssessmentStepsPreface": "If an assessment step references organization-defined elements (E.g. <organization-defined personnel or roles>, <organization-defined frequency>, etc.), corresponding citations/excerpts must be provided to confirm that the organization has established and documented these values and that they apply as referenced in the conformance criteria.
Similarly, if a \"Selection\" among multiple options (e.g. [Selection (one or more): as needed; ]) is specified, evidence must be provided to establish that the option(s) implemented by the organization have been defined and documented.\n
\nThe assessment step shall not be marked as satisfied without this evidence.",
"IssuanceCriteria": "yes(ALL)",
"Metadata": {
"PublicationDateTime": "2017-05-10T00:00:00.000Z",
"TargetRecipientDescription": "Organizations that want to demonstrate that they provide and/or consume digital information services in a manner that complies with information security standards such as NIST 800-53 and the FBI CJIS Security Policy.",
"Description": "Defines conformance and assessment criteria for verifying that an organization's CSO has set standards for the selection, supervision, and separation of personnel who have access to CJI.",
"Keywords": [
"Security",
"Information Assurance",
"CJIS Security Policy"
],
"ExtensionDescription": "This Trustmark Definition requires no extension data.",
"Name": "CJIS Systems Officer Responsibility - Control of Access To CJI",
"Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/cjis-systems-officer-responsibility---control-of-access-to-cji/1.0/",
"TargetProviderDescription": "Organizations that audit or evaluate other organizations for compliance with widely accepted information security standards and practices such as NIST Special Publication 800-53.",
"ProviderEligibilityCriteria": "Any organization or business entity may act as a Trustmark Provider for trustmarks under this Trustmark Definition.",
"Version": "1.0",
"TrustmarkRevocationCriteria": "For any trustmark issued under this Trustmark Definition, the Trustmark Provider must revoke the trustmark upon any condition whereby one or more Conformance Criteria cease to be satisfied.",
"LegalNotice": "This artifact is published by the Georgia Tech Research Institute (GTRI) as part of the Trustmark Initiative. This artifact and the information contained herein is provided on an \"AS IS\" basis, and GTRI disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, GTRI disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.",
"TargetRelyingPartyDescription": "Organizations and individuals that desire their trusted partners' computer and information systems to comply with information security standards and practices such as ecurity standards such as NIST 800-53 and the FBI CJIS Security Policy.",
"TargetStakeholderDescription": "Organizations that are interested in implementing or making use of digital information systems in a manner that complies with information security standards such as NIST 800-53 and the FBI CJIS Security Policy.",
"AssessorQualificationsDescription": "Any individual employed or contracted by the Trustmark Provider may act as the assessor for trustmarks under this Trustmark Definition.",
"TrustmarkDefiningOrganization": {
"Identifier": "https://trustmarkinitiative.org/",
"PrimaryContact": {
"Email": "help@trustmarkinitiative.org",
"Telephone": "555-555-5555",
"Kind": "PRIMARY",
"WebsiteURL": "https://trustmarkinitiative.org/",
"Responder": "Trustmark Support"
},
"Name": "Trustmark Initiative"
},
"Notes": "This trustmark definition is not officially endorsed by the FBI CJIS Division. Receipt of a trustmark based on this trustmark definition is in no way a substitute for an actual FBI CJIS audit or evaluation."
},
"Terms": [
{
"Definition": "The physical or logical (electronic) ability, right or privilege to view, modify or make use of Criminal Justice Information.",
"Name": "Access to Criminal Justice Information"
},
{
"Definition": "The official management decision given by a senior organization official to authorize operation of an information system and to explicitly accept the risk to organization operations (including mission, functions, image, or reputation), organization assets, or individuals, based on the implementation of an agreed-upon set of security controls.",
"Name": "Accreditation"
},
{
"Definition": "The detection, apprehension, detention, pretrial release, post-trial release, prosecution, adjudication, correctional supervision, or rehabilitation of accused persons or criminal offenders. It also includes criminal identification activities; the collection, storage, and dissemination of criminal history record information; and criminal justice employment. In addition, administration of criminal justice includes \"crime prevention programs\" to the extent access to criminal history record information is limited to law enforcement agencies for law enforcement programs (e.g. record checks of individuals who participate in Neighborhood Watch or \"safe house\" programs) and the result of such checks will not be disseminated outside the law enforcement agency.",
"Name": "Administration of Criminal Justice"
},
{
"Definition": "A mobile device that is centrally managed by an agency for the purpose of securing the device for potential access to CJI. The device can be agency issued or BYOD (personally owned).",
"Name": "Agency Controlled Mobile Device"
},
{
"Definition": "A staff member of the Contracting Government Agency who manages the agreement between the Contractor and agency.",
"Abbreviations": ["AC"],
"Name": "Agency Coordinator"
},
{
"Definition": "A mobile device that is owned by an agency and issued to an individual for use. It is centrally managed by the agency for the purpose of securing the device for potential access to CJI. The device is not BYOD (personally owned).",
"Name": "Agency Issued Mobile Device"
},
{
"Definition": "Coordinator of activities between the criminal justice agency and the noncriminal justice agency when responsibility for a criminal justice system has been delegated by a criminal justice agency to a noncriminal justice agency, which has in turn entered into an agreement with a contractor. The agency liaison shall, inter alia, monitor compliance with system security requirements. In instances in which the noncriminal justice agency's authority is directly from the CJIS systems agency, there is no requirement for the appointment of an agency liaison.",
"Abbreviations": ["AL"],
"Name": "Agency Liaison"
},
{
"Definition": "(1) A criminal justice agency or federal agency authorized to receive CHRI pursuant to federal statute or executive order; (2) A nongovernmental entity authorized by federal statute or executive order to receive CHRI for noncriminal justice purposes; or (3) A government agency authorized by federal statute or executive order, or state statute which has been approved by the United States Attorney General to receive CHRI for noncriminal justice purposes.",
"Name": "Authorized Recipient"
},
{
"Definition": "An individual, or group of individuals, who have been appropriately vetted through a national fingerprint-based record check and have been granted access to CJI.",
"Name": "Authorized User/Personnel"
},
{
"Definition": "Official with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organization operations (including mission, functions, image, or reputation), organization assets, or individuals. Synonymous with Accreditation Authority.",
"Name": "Authorizing Official"
},
{
"Definition": "Ensuring timely and reliable access to and use of information.",
"Name": "Availability"
},
{
"Definition": "Information collected about individuals associated with a unique case, and not necessarily connected to identity data. Biographic Data does not provide a history of an individual, only information related to a unique case.",
"Name": "Biographic Data"
},
{
"Definition": "When applied to CJI, it is used to identify individuals, and includes the following types: fingerprints, palm prints, DNA, iris, and facial recognition.",
"Name": "Biometric Data"
},
{
"Definition": "All relevant information gathered about an individual, organization, incident, or combination thereof, arranged so as to serve as an organized record to provide analytic value for a criminal justice organization. In regards to CJI, it is the information about the history of criminal incidents.",
"Name": "Case / Incident History"
},
{
"Definition": "Digital certificates required for certificate-based authentication that are issued to tell the client computers and servers that it can trust other certificates that are issued by this CA.",
"Name": "Certificate Authority (CA) Certificate"
},
{
"Definition": "A comprehensive assessment of the management, operational, and technical security controls in an information system, made in support of security accreditation, to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.",
"Name": "Certification"
},
{
"Definition": "A FBI approved contractor, who has entered into an agreement with an Authorized Recipient(s), to receive noncriminal justice applicant fingerprint submissions and collect the associated fees. The Channeler ensures fingerprint submissions are properly and adequately completed, electronically forwards fingerprint submissions to the FBI's CJIS Division for national noncriminal justice criminal history record check, and receives electronic record check results for dissemination to Authorized Recipients. A Channeler is essentially an \"expediter\" rather than a user of criminal history record check results.",
"Name": "Channeler"
},
{
"Definition": "The governing organization within the FBI CJIS Advisory Process composed of representatives from criminal justice and national security agencies within the United States. The APB reviews policy, technical, and operational issues relative to CJIS Division programs and makes subsequent recommendations to the Director of the FBI.",
"Abbreviations": ["APB"],
"Name": "CJIS Advisory Policy Board"
},
{
"Definition": "The organization within the FBI CJIS Division responsible to perform audits of CSAs to verify compliance with the CJIS Security Policy.",
"Abbreviations": ["CAU"],
"Name": "CJIS Audit Unit"
},
{
"Definition": "The FBI CJIS Security Policy document as published by the FBI CJIS ISO; the document containing this glossary.",
"Name": "CJIS Security Policy"
},
{
"Definition": "A duly authorized state, federal, international, tribal, or territorial criminal justice agency on the CJIS network providing statewide (or equivalent) service to its criminal justice users with respect to the CJI from various systems managed by the FBI CJIS Division. There shall be only one CSA per state or territory. In federal agencies, the CSA may be the interface or switch to other federal agencies connecting to the FBI CJIS systems.",
"Abbreviations": ["CSA"],
"Name": "CJIS Systems Agency"
},
{
"Definition": "The appointed FBI CJIS Division personnel responsible to coordinate information security efforts at all CJIS interface agencies.",
"Abbreviations": ["CSA ISO"],
"Name": "CJIS Systems Agency Information Security Officer"
},
{
"Definition": "The individual located within the CJIS Systems Agency responsible for the administration of the CJIS network on behalf of the CJIS Systems Agency.",
"Abbreviations": ["CSO"],
"Name": "CJIS Systems Officer"
},
{
"Definition": "A machine or software application that accesses cloud services over a network connection, perhaps on behalf of a subscriber.",
"Name": "Cloud Client"
},
{
"Definition": "A distributed computing model that permits on-demand network access to a shared pool of configurable computing resources (i.e., networks, servers, storage, applications, and services), software, and information.",
"Name": "Cloud Computing"
},
{
"Definition": "An organization that provides cloud computing services.",
"Name": "Cloud Provider"
},
{
"Definition": "A person or organization that is a customer of a cloud computing service provider.",
"Name": "Cloud Subscriber"
},
{
"Definition": "The entity created by the National Crime Prevention and Privacy Compact of 1998 that has the authority to promulgate rules and procedures governing the use of the III system for noncriminal justice purposes.",
"Name": "Compact Council"
},
{
"Definition": "The leadership of the Compact Council, oversees the infrastructure established by the National Crime Prevention and Privacy Compact Act of 1998, which is used by ratifying states to exchange criminal records for noncriminal justice purposes. Their primary responsibilities are to promulgate rules and procedures for the effective and appropriate use of the III system.",
"Name": "Compact Officers"
},
{
"Definition": "Compensating controls are temporary control measures implemented in lieu of the required control measures when an agency cannot meet the AA requirement due to legitimate technical or business constraints. The compensating controls must:\n1. Meet the intent of the CJIS Security Policy AA requirement\n2. Provide a similar level of protection or security as the original AA requirement\n3. Not rely upon the existing requirements for AA as compensating controls\nAdditionally, compensating controls may rely upon other, non-AA, existing requirements as compensating controls and/or be combined with new controls to create compensating controls.",
"Name": "Compensating Controls"
},
{
"Definition": "A collection of personnel, systems, and processes that are used to efficiently and quickly manage a centralized response to any sort of computer security incident which may occur.",
"Abbreviations": ["CSIRC"],
"Name": "Computer Security Incident Response Capability"
},
{
"Definition": "Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.",
"Name": "Confidentiality"
},
{
"Definition": "The government agency, whether a Criminal Justice Agency or a Noncriminal Justice Agency, which enters into an agreement with a private contractor.",
"Abbreviations": ["CGA"],
"Name": "Contracting Government Agency"
},
{
"Definition": "A private business, agency or individual which has entered into an agreement for the administration of criminal justice or noncriminal justice functions with a Criminal Justice Agency or a Noncriminal Justice Agency. Also, a private business approved by the FBI CJIS Division to contract with Noncriminal Justice Agencies to perform noncriminal justice functions associated with civil fingerprint submission for hiring purposes.",
"Name": "Contractor"
},
{
"Definition": "The data collected through the Uniform Crime Reporting program and reported upon annually by the FBI CJIS division used to analyze the crime statistics for the United States.",
"Name": "Crime Reports Data"
},
{
"Definition": "A subset of CJI. Any notations or other written or electronic evidence of an arrest, detention, complaint, indictment, information or other formal criminal charge relating to an identifiable person that includes identifying information regarding the individual as well as the disposition of any charges.",
"Abbreviations": ["CHRI"],
"Name": "Criminal History Record Information"
},
{
"Definition": "The courts, a governmental agency, or any subunit of a governmental agency which performs the administration of criminal justice pursuant to a statute or executive order and which allocates a substantial part of its annual budget to the administration of criminal justice. State and federal Inspectors General Offices are included.",
"Abbreviations": ["CJA"],
"Name": "Criminal Justice Agency"
},
{
"Definition": "A terms-of-service agreement that must be signed prior to accessing CJI. This agreement is required by each CJA and spells out user's responsibilities, the forms and methods of acceptable use, penalties for their violation, disclaimers, and so on.",
"Name": "Criminal Justice Agency User Agreement"
},
{
"Definition": "A criminal justice conveyance is any enclosed mobile vehicle used for the purposes of criminal justice activities with the capability to comply, during operational periods, with the requirements of Section 5.9.1.3.",
"Name": "Criminal Justice Conveyance"
},
{
"Definition": "Criminal Justice Information is the abstract term used to refer to all of the FBI CJIS provided data necessary for law enforcement agencies to perform their mission and enforce the laws, including but not limited to: biometric, identity history, person, organization, property (when accompanied by any personally identifiable information), and case/incident history data. In addition, CJI refers to the FBI CJIS-provided data necessary for civil agencies to perform their mission; including, but not limited to data used to make hiring decisions. The following type of data are exempt from the protection levels required for CJI: transaction control type numbers (e.g. ORI, NIC, FNU, etc.) when not accompanied by information that reveals CJI or PII.",
"Name": "Criminal Justice Information (CJI)"
},
{
"Definition": "The FBI division responsible for the collection, warehousing, and timely dissemination of relevant CJI to the FBI and to qualified law enforcement, criminal justice, civilian, academic, employment, and licensing agencies.",
"Abbreviations": [
"FBI CJIS",
"CJIS"
],
"Name": "Criminal Justice Information Services Division"
},
{
"Definition": "See Information and CJI.",
"Name": "Data"
},
{
"Definition": "Neutralize a magnetic field to erase information from a magnetic disk or other storage device. In the field of information technology, degauss has become synonymous with erasing information whether or not the medium is magnetic. In the event the device to be degaussed is not magnetic (e.g. solid state drive, USB storage device), steps other than magnetic degaussing may be required to render the information irretrievable from the device.",
"Name": "Degauss"
},
{
"Definition": "The Department within the U.S. Government responsible to enforce the law and defend the interests of the United States according to the law, to ensure public safety against threats foreign and domestic, to provide federal leadership in preventing and controlling crime, to seek just punishment for those guilty of unlawful behavior, and to ensure fair and impartial administration of justice for all Americans.",
"Abbreviations": ["DoJ"],
"Name": "Department of Justice"
},
{
"Definition": "Any form of electronic media designed to store data in a digital format. This includes, but is not limited to: memory device in laptops, computers, and mobile devices; and any removable, transportable electronic media, such as magnetic tape or disk, optical disk, flash drives, external hard drives, or digital memory card.",
"Name": "Digital Media"
},
{
"Definition": "A digital signature consists of three algorithms: (1) A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key. (2) A signing algorithm that, given a message and a private key, produces a signature. (3) A signature verifying algorithm that, given a message, public key, and a signature, either accepts or rejects the message's claim to authenticity. Two main properties are required. First, a signature generated from a fixed message and fixed private key should verify the authenticity of that message by using the corresponding public key. Secondly, it should be computationally infeasible to generate a valid signature for a party who does not possess the private key.",
"Name": "Digital Signature"
},
{
"Definition": "(1) Having the authority to access systems managed by the FBI CJIS Division, whether by manual or automated methods, not requiring the assistance of, or intervention by, any other party or agency (28 CFR, Chapter 1, Part 20). (2) Having the authority to query or update national databases maintained by the FBI CJIS Division including national queries and updates automatically or manually generated by the CSA.",
"Name": "Direct Access"
},
{
"Definition": "The transmission/distribution of CJI to Authorized Recipients within an agency.",
"Name": "Dissemination"
},
{
"Definition": "Aggregate of external procedures, conditions, and objects affecting the development, operation, and maintenance of an information system.",
"Name": "Environment"
},
{
"Definition": "Authorized personnel who accompany a visitor at all times while within a physically secure location to ensure the protection and integrity of the physically secure location and any Criminal Justice Information therein. The use of cameras or other electronic means used to monitor a physically secure location does not constitute an escort.",
"Name": "Escort"
},
{
"Definition": "The FBI personnel responsible for the maintenance and dissemination of the FBI CJIS Security Policy; the liaison between the FBI and the CSA's ISOs and other relevant security points-of-contact (POCs); the provider of technical guidance as to the intent and implementation of technical policy issues; the POC for computer incident notification which also disseminates security alerts to the CSOs and ISOs.",
"Name": "FBI CJIS Information Security Officer (FBI CJIS ISO)"
},
{
"Definition": "The agency within the DOJ responsible to protect and defend the United States against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the United States, and to provide leadership and criminal justice services to federal, state, municipal, and international agencies and partners.",
"Abbreviations": ["FBI"],
"Name": "Federal Bureau of Investigation"
},
{
"Definition": "The Federal Information Security Management Act of 2002, a US Federal law that established information security standards for the protection of economic and national security interests of the United States. It requires each federal agency to develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source.",
"Abbreviations": ["FISMA"],
"Name": "Federal Information Security Management Act"
},
{
"Definition": "A caveat applied to unclassified sensitive information that may be exempt from mandatory release to the public under the Freedom of Information Act (FOIA), 5 U.S.C 522. In general, information marked FOUO shall not be disclosed to anybody except Government (Federal, State, tribal, or local) employees or contractors with a need to know.",
"Abbreviations": ["FOUO"],
"Name": "For Official Use Only"
},
{
"Definition": "An operating system that has emulated hardware presented to it by a host operating system. Also referred to as the virtual machine (VM).",
"Name": "Guest Operating System"
},
{
"Definition": "Hit confirmation is a process that determines if the record in the hit response is current and valid and to alert the originating agency to the location of the person or property described in the NCIC record.",
"Name": "Hit Confirmation"
},
{
"Definition": "In the context of virtualization, the operating system that interfaces with the actual physical hardware and arbitrates between it and the guest operating systems. It is also referred to as a hypervisor.",
"Name": "Host Operating System"
},
{
"Definition": "See Host Operating System.",
"Name": "Hypervisor"
},
{
"Definition": "Textual data that corresponds with an individual's biometric data, providing a history of criminal and/or civil events for the identified individual.",
"Name": "Identity History Data"
},
{
"Definition": "An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.",
"Name": "Incident"
},
{
"Definition": "Having the authority to access systems containing CJI without providing the user the ability to conduct transactional activities (the capability to query or update) on state and national systems (e.g. CJIS Systems Agency (CSA), State Identification Bureau (SIB), or national repositories).",
"Name": "Indirect Access"
},
{
"Definition": "An instance of an information type; data.",
"Name": "Information"
},
{
"Definition": "An agreement that codifies the rules by which two parties engage in the sharing of information. These agreements typically include language which establishes some general duty-of-care over the other party's information, whether and how it can be further disseminated, penalties for violations, the laws governing the agreement (which establishes venue), procedures for the handling of shared information at the termination of the agreement, and so on. This document will ensure consistency with applicable federal laws, directives, policies, regulations, standards and guidance.",
"Name": "Information Exchange Agreement"
},
{
"Definition": "The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.",
"Name": "Information Security"
},
{
"Definition": "Typically a member of an organization who has the responsibility to establish and maintain information security policy, assesses threats and vulnerabilities, performs risk and control assessments, oversees the governance of security operations, and establishes information security training and awareness programs. The ISO also usually interfaces with security operations to manage implementation details and with auditors to verify compliance to established policies.",
"Abbreviations": ["ISO"],
"Name": "Information Security Officer"
},
{
"Definition": "A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.",
"Name": "Information System"
},
{
"Definition": "Any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the organization. For purposes of the preceding sentence, equipment is used by an organization if the equipment is used by the organization directly or is used by a contractor under a contract with the organization which: (i) requires the use of such equipment; or (ii) requires the use, to a significant extent, of such equipment in the performance of a service or the furnishing of a product. The term information technology includes computers, ancillary equipment, software, firmware and similar procedures, services (including support services), and related resources.",
"Name": "Information Technology"
},
{
"Definition": "Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.",
"Name": "InformationTypes"
},
{
"Definition": "The national fingerprint and criminal history system maintained by the FBI CJIS Division that provides the law enforcement community with automated fingerprint search capabilities, latent searching capability, electronic image storage, and electronic exchange of fingerprints and responses.",
"Abbreviations": ["IAFIS"],
"Name": "Integrated Automated Fingerprint Identification System"
},
{
"Definition": "Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.",
"Name": "Integrity"
},
{
"Definition": "An agreement much like an Information Exchange Agreement as mentioned above, but concentrating more on formalizing the technical and security requirements pertaining to some sort of interface between the parties' information systems.",
"Abbreviations": ["ISA"],
"Name": "Interconnection Security Agreement"
},
{
"Definition": "A legacy term used to describe agencies with direct connections to the CSA. This term is now used predominantly in a common way to describe any sub-agency of a CSA or SIB that leverages the CSA or SIB as a conduit to FBI CJIS information.",
"Name": "Interface Agency"
},
{
"Definition": "A protocol used for communicating data across a packet-switched internetwork using the Internet Protocol Suite, also referred to as TCP/IP. IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering distinguished protocol datagrams (packets) from the source host to the destination host solely based on their addresses.",
"Abbreviations": ["IP"],
"Name": "Internet Protocol"
},
{
"Definition": "The CJIS service that manages automated submission and requests for CHRI that is warehoused subsequent to the submission of fingerprint information. Subsequent requests are directed to the originating State as needed.",
"Abbreviations": ["III"],
"Name": "Interstate Identification Index"
},
{
"Definition": "The process of attaining privileged control (known as \"root access\") of a device running the Apple iOS operating system that ultimately allows a user the ability to alter or replace system applications and settings, run specialized applications that require administrator-level permissions, or perform other operations that are otherwise not allowed.",
"Name": "Jailbreak (Jailbroken)"
},
{
"Definition": "Laptop devices are mobile devices with a full-featured operating system (e.g. Microsoft Windows, Apple OS X, LINUX/UNIX, etc.). Laptops are typically intended for transport via vehicle mount or portfolio-sized carry case, but not on the body. This definition does not include pocket/handheld devices (e.g. smartphones), or mobile devices that feature a limited feature operating system (e.g. tablets).",
"Name": "Laptop Devices"
},
{
"Definition": "A secure, Internet-based communications portal provided by the FBI CJIS Division for use by law enforcement, first responders, criminal justice professionals, and anti-terrorism and intelligence agencies around the globe. Its primary purpose is to provide a platform on which various law enforcement agencies can collaborate on FOUO matters.",
"Abbreviations": ["LEEP"],
"Name": "Law Enforcement Enterprise Portal"
},
{
"Definition": "The primary Information Security contact between a local law enforcement agency and the CSA under which this agency interfaces with the FBI CJIS Division. The LASO actively represents their agency in all matters pertaining to Information Security, disseminates Information Security alerts and other material to their constituents, maintains Information Security documentation (including system configuration data), assists with Information Security audits of hardware and procedures, and keeps the CSA informed as to any Information Security needs and problems.",
"Abbreviations": ["LASO"],
"Name": "Local Agency Security Officer"
},
{
"Definition": "The technical means (e.g., read, create, modify, delete a file, execute a program, or use an external connection) for an individual or other computer system to utilize CJI or CJIS applications.",
"Name": "Logical Access"
},
{
"Definition": "When the host operating system, or hypervisor, allows multiple guest operating systems to share the same physical resources.",
"Name": "Logical Partitioning"
},
{
"Definition": "An agreement between parties that wish to share or pool resources that codifies precisely who has administrative control over, versus overall management and legal responsibility for, assets covered under the agreement. An MCA must ensure the CJA's authority remains with regard to all aspects of Section 3.2.2. The MCA usually results in the CJA having ultimate authority over the CJI supporting infrastructure administered by the NCJA.",
"Abbreviations": ["MCA"],
"Name": "Management Control Agreement"
},
{
"Definition": "The security controls (i.e., safeguards or countermeasures) for an information system that focus on the management of risk and the management of information system security.",
"Name": "Management Controls"
},
{
"Definition": "Physical devices or writing surfaces including, but not limited to, magnetic tapes, optical disks, magnetic disks, Large-Scale Integration (LSI) memory chips, printouts (but not including display media) onto which information is recorded, stored, or printed within an information system.",
"Name": "Media"
},
{
"Definition": "Any portable device used to access CJI via a wireless connection (e.g. cellular, WiFi, Bluetooth, etc.).",
"Name": "Mobile Device"
},
{
"Definition": "Centralized administration and control of mobile devices specifically including, but not limited to, cellular phones, smart phones, and tablets. Management typically includes the ability to configure device settings and prevent a user from changing them, remotely locating a device in the event of theft or loss, and remotely locking or wiping a device. Management can also include over-the-air distribution of applications and updating installed applications.",
"Abbreviations": ["MDM"],
"Name": "Mobile Device Management"
},
{
"Definition": "An information system which stores CJI which can be queried by appropriate Federal, state, and local law enforcement and other criminal justice agencies.",
"Abbreviations": ["NCIC"],
"Name": "National Crime Information Center"
},
{
"Definition": "A system mandated by the Brady Handgun Violence Prevention Act of 1993 that is used by Federal Firearms Licensees (FFLs) to instantly determine via telephone or other electronic means whether the transfer of a firearm would be in violation of Section 922 (g) or (n) of Title 18, United States Code, or state law, by evaluating the prospective buyer's criminal history.",
"Abbreviations": ["NICS"],
"Name": "National Instant Criminal Background Check System"
},
{
"Definition": "Founded in 1901, NIST is a non-regulatory federal agency within the U.S. Department of Commerce whose mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic and national security.",
"Abbreviations": ["NIST"],
"Name": "National Institute of Standards and Technology"
},
{
"Definition": "A Federal, state, local, or tribal governmental agency or any subunit thereof whose charter does not include the responsibility to administer criminal justice, but may have a need to process CJI. An example would be the central IT organization within a state government that administers equipment on behalf of a state law-enforcement agency.",
"Name": "NCJA (Government)"
},
{
"Definition": "A private agency or subunit thereof whose charter does not include the responsibility to administer criminal justice, but may have a need to process CJI. An example would include a local bank.",
"Name": "NCJA (Private)"
},
{
"Definition": "A public agency or sub-unit thereof whose charter does not include the responsibility to administer criminal justice, but may have a need to process CJI. An example would include a county school board which uses CHRI to assist in employee hiring decisions.",
"Name": "NCJA (Public)"
},
{
"Definition": "A governmental agency, or any subunit thereof, that provides services primarily for purposes other than the administration of criminal justice. Examples of services include, but not limited to, employment suitability, licensing determinations, immigration and naturalization matters, and national security clearances.",
"Abbreviations": ["NCJA"],
"Name": "Noncriminal Justice Agency"
},
{
"Definition": "The uses of criminal history records for purposes authorized by federal or state law other than purposes relating to the administration of criminal justice, including employment suitability, licensing determinations, immigration and naturalization matters, and national security clearances.",
"Name": "Noncriminal Justice Purpose"
},
{
"Definition": "The agency within the Executive Branch of the Federal government responsible to oversee the preparation of the federal budget, to assist in the supervision of other Executive Branch agencies, and to oversee and coordinate the Presidential Administration's procurement, financial management, information, and regulatory policies.",
"Abbreviations": ["OMB"],
"Name": "Office of Management and Budget"
},
{
"Definition": "An organized body of people with a particular purpose, especially a business, society, association, government agency, etc.",
"Name": "Organization"
},
{
"Definition": "The process of delegating in-house operations to a third-party. For instance, when the administration of criminal justice functions (network operations, dispatch functions, system administration operations, etc.) are performed for the criminal justice agency by a city or county information technology department or are contracted to be performed by a vendor.",
"Name": "Outsourcing"
},
{
"Definition": "National Crime Prevention and Privacy Compact Council's Outsourcing Standard. The Compact Council's uniform standards and processes for the interstate and Federal-State exchange of criminal history records for noncriminal justice purposes.",
"Name": "Outsourcing Standard"
},
{
"Definition": "Managing guest operating system, or virtual machine, access to hardware so that each guest OS can access its own resources but cannot encroach on the other guest operating systems resources or any resources not allocated for virtualization use.",
"Name": "Partitioning"
},
{
"Definition": "An application which controls network traffic to and from a computer, permitting or denying communications based on a security policy.",
"Name": "Personal Firewall"
},
{
"Definition": "PII is information which can be used to distinguish or trace an individual's identity, such as name, social security number, or biometric records, alone or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, or mother's maiden name.",
"Abbreviations": ["PII"],
"Name": "Personally Identifiable Information"
},
{
"Definition": "The physical ability, right or privilege to view, modify or make use of Criminal Justice Information (CJI) by means of physical presence within the proximity of computers and network devices (e.g. the ability to insert a boot disk or other device into the system, make a physical connection with electronic equipment, etc.).",
"Name": "Physical Access"
},
{
"Definition": "Physical media refers to media in printed form. This definition includes, but is not limited to, printed documents, printed imagery, printed facsimile.",
"Name": "Physical Media"
},
{
"Definition": "When the host operating system, or hypervisor, assigns separate physical resources to each guest operating systems, or virtual machine.",
"Name": "Physical Partitioning"
},
{
"Definition": "A facility, a criminal justice conveyance, or an area, a room, or a group of rooms, within a facility with both the physical and personnel security controls sufficient to protect CJI and associated information systems.",
"Name": "Physically Secure Location"
},
{
"Definition": "Pocket/Handheld mobile devices (e.g. smartphones) are intended to be carried in a pocket or holster attached to the body and feature an operating system with limited functionality (e.g., iOS, Android, BlackBerry, etc.). This definition does not include tablet and laptop devices.",
"Name": "Pocket/Handheld Mobile Device"
},
{
"Definition": "Any devices that can be easily moved or carried by design (i.e. laptops, handhelds, personal digital assistants, etc.).",
"Name": "Portable Device"
},
{
"Definition": "The loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect, a serious adverse effect, or a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.",
"Name": "Potential Impact"
},
{
"Definition": "Information about vehicles and property associated with a crime.",
"Name": "Property Data"
},
{
"Definition": "A NGI service that allows authorized agencies to receive notification of subsequent criminal activity reported to the FBI committed by persons of interest.",
"Name": "Rap Back"
},
{
"Definition": "A device that is configured to accept a limited type of data but is technically prohibited from forming or transmitting data, browsing or navigating internal or external networks, or otherwise performing outside the scope of receive only (e.g., a printer, dumb terminal, etc.).",
"Abbreviations": ["ROT"],
"Name": "Receive-Only Terminal"
},
{
"Definition": "All books, papers, maps, photographs, machine-readable materials, or other documentary materials, regardless of physical form or characteristics, made or received by an organization in connection with the transaction of business and preserved or appropriate for preservation by that organization or its legitimate successor as evidence of the organization, functions, policies, decisions, procedures, operations or other activities such as legal requirements or because of the informational value of the data in them.",
"Name": "Records"
},
{
"Definition": "The designated manager of the agency having oversight responsibility for a CSA's fingerprint identification services. If both state fingerprint identification services and CJIS systems control are managed within the same state agency, the repository manager and CSO may be the same person.",
"Name": "Repository Manager, or Chief Administrator"
},
{
"Definition": "The level of impact on organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals resulting from the operation of an information system given the potential impact of a threat and the likelihood of that threat occurring.",
"Name": "Risk"
},
{
"Definition": "The process of managing risks to organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals resulting from the operation of an information system, and includes: (i) the conduct of a risk assessment; (ii) the implementation of a risk mitigation strategy; and (iii) employment of techniques and procedures for the continuous monitoring of the security state of the information system.",
"Name": "Risk Management"
},
{
"Definition": "The process of attaining privileged control (known as \"root access\") of a device running the Android operating system that ultimately allows a user the ability to alter or replace system applications and settings, run specialized applications that require administrator-level permissions, or perform other operations that are otherwise not allowed.",
"Name": "Root (Rooting, Rooted)"
},
{
"Definition": "Protective measures prescribed to meet the security requirements (i.e., confidentiality, integrity, and availability) specified for an information system. Safeguards may include security features, management constraints, personnel security, and security of physical structures, areas, and devices. Synonymous with security controls and countermeasures.",
"Name": "Safeguards"
},
{
"Definition": "Process to remove information from media such that information recovery is not possible. It includes removing all labels, markings, and activity logs.",
"Name": "Sanitization"
},
{
"Definition": "The promulgation of CJI from a releasing agency to an authorized recipient agency when the recipient agency has not been previously identified in a formal information exchange agreement.",
"Name": "Secondary Dissemination"
},
{
"Definition": "A uniform addendum to an agreement between the government agency and a private contractor, approved by the Attorney General of the United States, which specifically authorizes access to criminal history record information, limits the use of the information to the purposes for which it is provided, ensures the security and confidentiality of the information consistent with existing regulations and the CJIS Security Policy, provides for sanctions, and contains such other provisions as the Attorney General may require.",
"Abbreviations": ["SA"],
"Name": "Security Addendum"
},
{
"Definition": "The characterization of information or an information system based on an assessment of the potential impact that a loss of confidentiality, integrity, or availability of such information or information system would have on organizational operations, organizational assets, or individuals.",
"Name": "Security Category"
},
{
"Definition": "The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information.",
"Name": "Security Controls"
},
{
"Definition": "See System Security Plan.",
"Name": "Security Plan"
},
{
"Definition": "Requirements levied on an information system that are derived from applicable laws, orders, directives, policies, standards, instructions, regulations, or procedures, or organizational mission/business case needs to ensure the confidentiality, integrity, and availability of the information being processed, stored, or transmitted.",
"Name": "Security Requirements"
},
{
"Definition": "Designation of information in the United States federal government that, though unclassified, often requires strict controls over its distribution. SBU is a broad category of information that includes material covered by such designations as For Official Use Only (FOUO), Law Enforcement Sensitive (LES), Sensitive Homeland Security Information, Security Sensitive Information (SSI), Critical Infrastructure Information (CII), etc. Some categories of SBU information have authority in statute or regulation (e.g. SSI, CII) while others, including FOUO, do not. As of May 9, 2008, the more appropriate terminology to use is Controlled Unclassified Information (CUI).",
"Abbreviations": ["SBU"],
"Name": "Sensitive But Unclassified"
},
{
"Definition": "Digital certificates that are issued to servers or client computers or devices by a CA and used to prove device identity between server and/or client computer devices during the authentication process.",
"Name": "Server/Client Computer Certificate (device-based)"
},
{
"Definition": "The organized system of apparatus, appliances, personnel, etc, that supply some tangible benefit to the consumers of this service. In the context of CJI, this usually refers to one of the applications that can be used to process CJI.",
"Name": "Service"
},
{
"Definition": "A device used for shredding documents, often as a security measure to prevent unapproved persons from reading them. Strip-cut shredders, also known as straight-cut or spaghetti-cut, slice the paper into long, thin strips but are not considered secure. Cross-cut shredders provide more security by cutting paper vertically and horizontally into confetti-like pieces.",
"Name": "Shredder"
},
{
"Definition": "See pocket/handheld mobile devices.",
"Name": "Smartphone"
},
{
"Definition": "The act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim.",
"Name": "Social Engineering"
},
{
"Definition": "A piece of software designed to fix problems with, or update, a computer program or its supporting data. This includes fixing security vulnerabilities and other bugs and improving the usability or performance. Though meant to fix problems, poorly designed patches can sometimes introduce new problems. As such, patches should be installed in a test environment prior to being installed in a live, operational system. Patches often can be found in multiple locations but should be retrieved only from sources agreed upon through organizational policy.",
"Name": "Software Patch"
},
{
"Definition": "Irrelevant or inappropriate messages sent on the Internet to a large number of recipients.",
"Name": "Spam"
},
{
"Definition": "A written agreement that each CSA or SIB Chief shall execute with the FBI CJIS Division stating their willingness to demonstrate conformance with the FBI CJIS Security Policy prior to the establishment of connectivity between organizations. This agreement includes the standards and sanctions governing use of CJIS systems, as well as verbiage to allow the FBI to periodically audit the CSA as well as to allow the FBI to penetration test its own network from the CSA's interfaces to it.",
"Name": "State and Federal Agency User Agreement"
},
{
"Definition": "The representative of a state that is party to the National Crime Prevention and Privacy Compact, and is the chief administrator of the state's criminal history record repository or a designee of the chief administrator who is a regular full-time employee of the repository.",
"Name": "State Compact Officer"
},
{
"Definition": "The state agency with the responsibility for the state's fingerprint identification services.",
"Abbreviations": ["SIB"],
"Name": "State Identification Bureau"
},
{
"Definition": "The SIB Chief is the designated manager of state's SIB. If both state fingerprint identification services and CJIS systems control are managed within the same state agency, the SIB Chief and CSO may be the same person.",
"Abbreviations": ["SIB Chief"],
"Name": "State Identification Bureau Chief"
},
{
"Definition": "A state of residency is the state in which an individual claims and can provide documented evidence as proof of being his/her permanent living domicile. CJIS Systems Officers have the latitude to determine what documentation constitutes acceptable proof of residency.",
"Name": "State of Residency"
},
{
"Definition": "See information system.",
"Name": "System"
},
{
"Definition": "Formal document that provides an overview of the security requirements for an information system and describes the security controls in place or planned for meeting those requirements.",
"Name": "System Security Plan"
},
{
"Definition": "Tablet devices are mobile devices with a limited feature operating system (e.g. iOS, Android, Windows RT, etc.). Tablets typically consist of a touch screen without a permanently attached keyboard intended for transport via vehicle mount or portfolio-sized carry case but not on the body. This definition does not include pocket/handheld devices (e.g. smartphones) or mobile devices with full-featured operating systems (e.g. laptops).",
"Name": "Tablet Devices"
},
{
"Definition": "Serves as the point-of-contact at the local agency for matters relating to CJIS information access. A TAC administers CJIS systems programs within the local agency and oversees the agency's compliance with CJIS systems policies.",
"Abbreviations": ["TAC"],
"Name": "Terminal Agency Coordinator"
},
{
"Definition": "Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.",
"Name": "Threat"
},
{
"Definition": "Individual or (system) process authorized to access an information system.",
"Name": "User"
},
{
"Definition": "Digital certificates that are unique and issued to individuals by a CA. Though not always required to do so, these specific certificates are often embedded on smart cards or other external devices as a means of distribution to specified users. This certificate is used when individuals need to prove their identity during the authentication process.",
"Name": "User Certificate (user-based)"
},
{
"Definition": "Authorized personnel who actively monitor a remote maintenance session on Criminal Justice Information (CJI)-processing systems. The escort must have the ability to end the session at any time deemed necessary to ensure the protection and integrity of CJI at all times.",
"Name": "Virtual Escort"
},
{
"Definition": "See Guest Operating System",
"Abbreviations": ["VM"],
"Name": "Virtual Machine"
},
{
"Definition": "Refers to a methodology of dividing the resources of a computer (hardware and software) into multiple execution environments, by applying one or more concepts or technologies such as hardware and software partitioning, time-sharing, partial or complete machine simulation or emulation allowing multiple operating systems, or images, to run concurrently on the same hardware.",
"Name": "Virtualization"
},
{
"Definition": "A set of software, hardware, and standards designed to make it possible to transmit voice over packet switched networks, either an internal Local Area Network, or across the Internet.",
"Abbreviations": ["VoIP"],
"Name": "Voice over Internet Protocol"
},
{
"Definition": "Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.",
"Name": "Vulnerability"
}
],
"ConformanceCriteriaPreface": "If conformance criteria reference organization-defined elements (e.g. <organization-defined personnel or roles>, <organization-defined frequency>, etc.), these values must be defined and documented by the organization.
Similarly, if the criteria specify a \"Selection\" among multiple options (e.g. [Selection (one or more): as needed; ]), the option(s) implemented by the organization must also be defined and documented.",
"$Type": "TrustmarkDefinition",
"Sources": [{
"Identifier": "CJIS-SP-V5-4",
"Reference": "Criminal Justice Information Services (CJIS) Security Policy Version 5.4, 10/06/2015, CJISD-ITS-DOC-08140-5.4",
"$id": "source-1122302982"
}]
}