5 CJIS Compliance Tools
FBI CJIS Security Policy Mandates Advanced Authentication
Heartland Business Systems has a dedicated CJIS team, focusing on Illinois, Michigan, Minnesota and Wisconsin, along with solutions to help police departments, municipalities and courts comply with the CJIS requirements. Heartland can consult and assist you with compliance and Advance Authentication requirements for CJIS version 5.1.
CJIS SECURITY POLICY 2011-2012 VERSION 5.1
Section 5.6 CJIS Security Policy Area 6– Identification and Authentication
188.8.131.52.1 The requirement to use or not use AA is dependent upon the physical, personnel and technical security controls associated with the user location. For example, AA shall not be required for users requesting access to CJI from within the perimeter of a physically secure location (Section 5.9), when the technical security controls have been met (Section 5.5 and 5.10). Conversely, if the technical security controls have not been met AA shall be required even if the request for CJI originates from within a physically secure location. Section 184.108.40.206.2 provides agencies with a decision tree to help guide AA decisions. (Advanced Authentication Policy and Rationale)
Does this requirement apply to you?
All police departments, municipalities, courts and anyone requiring access to the CJIS Database needs to be compliant in 2013.
Pricing: "Hosted CJIS" Entrust Advanced Authentication
- Complete Low Cost Solution – per seat, per month
- Ease of installation and management
- Ability to add one user at a time
Looking for more information?