How Can Agencies Achieve CJIS Compliance?
As we all know, the CJIS policy is now final and mandates that all agencies must have enforced unique IDs strong passwords by September, 2010, and that all agencies must comply with the CJIS Advanced Authentication requirement by 2013. However, if your agency has performed a system upgrade after 2005, the 2013 deadline advances to the time of the upgrade. If your agency is audited and found not to be in compliance with the CJIS policy, it could face losing access to CJIS systems.
Choosing a solution to comply with CJIS requirements can be daunting. There are a number of factors you should consider, including whether the solution complies with all CJIS approved authentication methods, requires no schema extensions or other modifications to existing LDAP directory, or if it provides end-to-end compliance with the FIPS 140-2 encryption standard.
To learn more on how to comply CJIS security policy, hear Tom Rowles, Enterprise Support Supervisor at Polk County Sheriff’s Office (PCSO) in Florida, share his experiences on how PCSO:
- Successfully complied with CJIS requirements
- Eliminated complex passwords
- Reduced helpdesk calls
- Streamlined access to public safety applications
When: Wednesday, March 23rd, 2011 at 1:00 PM EST.